Patents by Inventor Lloyd Leon Burch

Lloyd Leon Burch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150215775
    Abstract: At least two mobile devices introduce one another and select data for transfer to and receipt by at least one receiving mobile device using audio communications. Each of the devices uses its speaker(s) and its microphone to introduce and select the data. Once secure audio communications are confirmed between the devices, the selected data is acquired by the at least one receiving mobile device using audio communications or a different out-of-band communication wired or wireless network.
    Type: Application
    Filed: January 29, 2014
    Publication date: July 30, 2015
    Applicant: NOVELL, INC.
    Inventors: Lloyd Leon Burch, Baha Masoud
  • Patent number: 9088480
    Abstract: Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service.
    Type: Grant
    Filed: November 11, 2013
    Date of Patent: July 21, 2015
    Assignee: Novell, Inc.
    Inventors: Lloyd Leon Burch, Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Michael John Jorgensen, Thomas Larry Biggs
  • Publication number: 20150200928
    Abstract: Techniques for secure access management to virtual environments are provided. A user authenticates to a portal for purposes of establishing a virtual machine (VM). The portal interacts with a cloud server and an identity server to authenticate the user, to acquire an Internet Protocol (IP) address and port number for the VM, and to obtain a secure token. The user then interacts with a secure socket layer virtual private network (SSL VPN) server to establish a SSL VPN session with the VM. The SSL VPN server also authenticates the token through the identity server and acquires dynamic policies to enforce during the SSL VPN session between the user and the VM (the VM managed by the cloud server).
    Type: Application
    Filed: March 16, 2015
    Publication date: July 16, 2015
    Inventors: Lloyd Leon Burch, Prakash Umasankar Mukkara, Douglas Garry Earl
  • Publication number: 20150156198
    Abstract: Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a website displaying an embedded code as an image alongside a normal login process for that website. The image is identified by the mobile device, encrypted and signed by the mobile device and sent to a proxy. The proxy authenticates the code and associates it with the website. Credentials for the user are provided to the website to automatically authenticate the user for access to the website bypassing the normal login process associated with the website.
    Type: Application
    Filed: December 18, 2014
    Publication date: June 4, 2015
    Inventors: Jason Allen Sabin, Jeremy Ray Brown, Lloyd Leon Burch
  • Patent number: 9049182
    Abstract: Techniques for virtual Representational State Transfer (REST) interfaces are provided. A proxy is interposed between a client and a REST service over a network. The proxy performs independent authentication of the client and provides credentials to the client and for the client to authenticate to the REST service using a REST service authentication mechanism. The proxy inspects requests and responses and translates the requests and responses into formats expected by the client and the REST service. Moreover, the proxy enforces policy and audits the requests and responses occurring between the client and the REST service over the network.
    Type: Grant
    Filed: October 29, 2009
    Date of Patent: June 2, 2015
    Assignee: Novell, Inc.
    Inventors: Lloyd Leon Burch, Douglas Garry Earl, Jonathan Paul Bultmeyer, Carolyn B. McClain
  • Patent number: 9043935
    Abstract: Techniques for personalizing content are presented. A principal requests access to content. Policy is evaluated in response to the request for the content. Scripts are processed in response to the policy evaluation to rewrite and modify the content. The modified content is then delivered to the requesting principal to personalize the content for the principal.
    Type: Grant
    Filed: May 18, 2007
    Date of Patent: May 26, 2015
    Assignee: Novell, Inc.
    Inventors: Cameron Craig Morris, Lloyd Leon Burch
  • Publication number: 20150143458
    Abstract: Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies.
    Type: Application
    Filed: January 30, 2015
    Publication date: May 21, 2015
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Stephen R. Carter
  • Publication number: 20150120921
    Abstract: Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment.
    Type: Application
    Filed: January 8, 2015
    Publication date: April 30, 2015
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Matthew Holt, Michael John Jorgensen, Michael Fairbanks, Chad Buttars
  • Publication number: 20150121448
    Abstract: In a computing system environment for viewing, accessing, and executing computing resources on one or more computing devices of a user, methods and apparatus include creating an object configured to provide at least one navigational aid for display on at least one of the computing devices. The object allows a user to view, navigate to, and access the computing resource. The object further includes one or more computing policies defining access rights for the computing resource and a listing of one or more other computing resources required for loading and/or executing the computing resource. Other computing resources necessary for loading and/or executing the computing resource are held separate from the object, thus providing information needed to execute the computing resource to the user while abstracting methods and resources required to build and use the computing resource.
    Type: Application
    Filed: October 31, 2013
    Publication date: April 30, 2015
    Applicant: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Baha Masoud, Thomas Crabb
  • Publication number: 20150121064
    Abstract: Techniques for secure message offloading are presented. An intermediary is transparently situated between a user's local messaging client and an external and remote messaging client. The user authenticates to the local client for access and the intermediary authenticates the user for access to the remote client using different credentials unknown to the user. Messages sent from the local client are transparently encrypted by the intermediary before being passed to the remote client and messages received from the remote client are transparently decrypted before being delivered to the local client.
    Type: Application
    Filed: January 8, 2015
    Publication date: April 30, 2015
    Inventors: Lloyd Leon Burch, Volker Gunnar Scheuber Heinz, Jon Hardman
  • Publication number: 20150121498
    Abstract: An app of a mobile device registers the mobile device for a remote credential server (RCS) and receives a device token. When a credential for a remote asset is supplied on the mobile device it is routed to the RCS and stored external to the mobile device but referenced on the mobile device via an asset token. When the credential is needed, the device token and the asset token permit the RCS to authenticate and return the credential to or on behalf of the mobile device so that the mobile device can authenticate to and access the remote asset.
    Type: Application
    Filed: October 28, 2014
    Publication date: April 30, 2015
    Inventors: Lloyd Leon Burch, Michael F. Angelo, Baha Masoud
  • Patent number: 8984621
    Abstract: Techniques for secure access management to virtual environments are provided. A user authenticates to a portal for purposes of establishing a virtual machine (VM). The portal interacts with a cloud server and an identity server to authenticate the user, to acquire an Internet Protocol (IP) address and port number for the VM, and to obtain a secure token. The user then interacts with a secure socket layer virtual private network (SSL VPN) server to establish a SSL VPN session with the VM. The SSL VPN server also authenticates the token through the identity server and acquires dynamic policies to enforce during the SSL VPN session between the user and the VM (the VM managed by the cloud server).
    Type: Grant
    Filed: February 27, 2010
    Date of Patent: March 17, 2015
    Assignee: Novell, Inc.
    Inventors: Lloyd Leon Burch, Prakash Umasankar Mukkara, Douglas Garry Earl
  • Patent number: 8977775
    Abstract: Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies.
    Type: Grant
    Filed: May 30, 2013
    Date of Patent: March 10, 2015
    Assignee: Novell. Inc.
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Stephen R. Carter
  • Patent number: 8959575
    Abstract: In a computing system environment, an arrangement of computing devices includes multiple layers behind a content flow director, such as an L4 switch in a web service. In a computing device of an outermost layer directly communicating with the content flow director, a communications port is conditionally enabled upon policy being met or exceeded in the computing system environment behind the content flow director. If unmet, the communications port is disabled, if already enabled, or prevented from becoming enabled, if not otherwise already enabled. In this manner, policy establishes port enablement. In certain aspects, policy determinations include determining a time of response, a quality of service check or a pass/fail condition of the one of the computing devices. Policy is also easily implemented as remote or local computer executable instructions on the computing devices. Representative computing devices include switches, such as L4 switches, routers, servers, repeaters, adapters or the like.
    Type: Grant
    Filed: September 13, 2012
    Date of Patent: February 17, 2015
    Assignee: Apple Inc.
    Inventors: Steven Adams Flewallen, David Nephi Johnson, Lloyd Leon Burch, Benjamin Clark Fjeldsted, David Kent Beus, Thiruvarangam Viswanathan Sriram
  • Patent number: 8949505
    Abstract: Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a principal, the personalized storage used to personalize the virtual image without altering the virtual image.
    Type: Grant
    Filed: September 12, 2013
    Date of Patent: February 3, 2015
    Assignee: Novell, Inc.
    Inventors: Lloyd Leon Burch, Jason Allen Sabin, Kal A. Larsen, Nathaniel Brent Kranendonk, Michael John Jorgensen
  • Patent number: 8949832
    Abstract: Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment.
    Type: Grant
    Filed: August 29, 2011
    Date of Patent: February 3, 2015
    Assignee: Novell, Inc.
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Matthew Holt, Michael John Jorgensen, Michael Fairbanks, Chad Buttars
  • Patent number: 8943320
    Abstract: Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a website displaying an embedded code as an image alongside a normal login process for that website. The image is identified by the mobile device, encrypted and signed by the mobile device and sent to a proxy. The proxy authenticates the code and associates it with the website. Credentials for the user are provided to the website to automatically authenticate the user for access to the website bypassing the normal login process associated with the website.
    Type: Grant
    Filed: October 31, 2011
    Date of Patent: January 27, 2015
    Assignee: Novell, Inc.
    Inventors: Jason Allen Sabin, Jeremy Ray Brown, Lloyd Leon Burch
  • Patent number: 8938613
    Abstract: Techniques for secure message offloading are presented. An intermediary is transparently situated between a user's local messaging client and an external and remote messaging client. The user authenticates to the local client for access and the intermediary authenticates the user for access to the remote client using different credentials unknown to the user. Messages sent from the local client are transparently encrypted by the intermediary before being passed to the remote client and messages received from the remote client are transparently decrypted before being delivered to the local client.
    Type: Grant
    Filed: May 31, 2012
    Date of Patent: January 20, 2015
    Assignee: Novell, Inc.
    Inventors: Lloyd Leon Burch, Volker Gunnar Scheuber-Heinz, Jon Hardman
  • Publication number: 20140380316
    Abstract: Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a principal, the personalized storage used to personalize the virtual image without altering the virtual image.
    Type: Application
    Filed: September 8, 2014
    Publication date: December 25, 2014
    Inventors: Lloyd Leon Burch, Jason Allen Sabin, Kal A. Larsen, Nathaniel Brent Kranendonk, Michael John Jorgensen
  • Publication number: 20140380411
    Abstract: Techniques for spawning workloads are provided. A single repository is read once to obtain an image for a workload or files and resources for the image. The read operation spawns multiple, and in some cases, concurrent write operations, to instantiate the workload over a network as multiple occurrences or instances of the workload in multiple processing environments.
    Type: Application
    Filed: September 8, 2014
    Publication date: December 25, 2014
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Lloyd Leon Burch, Michael John Jorgensen