Patents by Inventor Patrick R. Felsted

Patrick R. Felsted has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8479254
    Abstract: The user can associate metadata with information cards. The metadata can include, among other possibilities, string names, icons, user policies, containers, and hierarchies. The metadata is stored by the computer system. The metadata can then be used to filter the set of information cards that can satisfy a security policy from a relying party.
    Type: Grant
    Filed: August 22, 2007
    Date of Patent: July 2, 2013
    Assignee: Apple Inc.
    Inventors: Duane F. Buss, Patrick R. Felsted, Andrew A. Hodgkinson, Daniel S. Sanders
  • Patent number: 8370913
    Abstract: A user defines an audit policy. The audit policy identifies one or more triggers that, when related information is included in a security token, trigger the performance of the audit. The audit can include notifying the user in some manner that the trigger occurred. The audit can require in-line confirmation of the audit, so that the security token is not transmitted until the user confirms the audit.
    Type: Grant
    Filed: August 22, 2007
    Date of Patent: February 5, 2013
    Assignee: Apple Inc.
    Inventors: Andrew A. Hodgkinson, Duane F. Buss, Thomas E. Doman, Patrick R. Felsted, James G. Sermersheim
  • Patent number: 8364600
    Abstract: A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
    Type: Grant
    Filed: February 28, 2011
    Date of Patent: January 29, 2013
    Assignee: Apple Inc.
    Inventors: Patrick R. Felsted, Thomas E. Doman, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson, Dale R. Olds
  • Publication number: 20130014207
    Abstract: A user defines an audit policy. The audit policy identifies one or more triggers that, when related information is included in a security token, trigger the performance of the audit. The audit can include notifying the user in some manner that the trigger occurred. The audit can require in-line confirmation of the audit, so that the security token is not transmitted until the user confirms the audit.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Applicant: APPLE INC.
    Inventors: Andrew A. Hodgkinson, Duane F. Buss, Thomas E. Doman, Patrick R. Felsted, James G. Sermersheim
  • Patent number: 8074257
    Abstract: When a user connects a pluggable card store to a machine, the machine plugs a pluggable card provider into a card provider registry. The pluggable card store can be an object portable to the user, or can be a remote store available via some connection, such as an FTP connection. The user can then use the information cards stored on the pluggable card store in a transaction.
    Type: Grant
    Filed: August 22, 2007
    Date of Patent: December 6, 2011
    Inventors: Patrick R. Felsted, Andrew A. Hodgkinson, Daniel S. Sanders, James G. Sermersheim, James Mark Norman
  • Patent number: 8073783
    Abstract: A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
    Type: Grant
    Filed: August 22, 2007
    Date of Patent: December 6, 2011
    Inventors: Patrick R. Felsted, Thomas E. Doman, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson, Dale R. Olds
  • Publication number: 20110153499
    Abstract: A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
    Type: Application
    Filed: February 28, 2011
    Publication date: June 23, 2011
    Applicant: NOVELL, INC.
    Inventors: Patrick R. Felsted, Thomas E. Doman, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson, Dale R. Olds
  • Publication number: 20080229398
    Abstract: When a user connects a pluggable card store to a machine, the machine plugs a pluggable card provider into a card provider registry. The pluggable card store can be an object portable to the user, or can be a remote store available via some connection, such as an FTP connection. The user can then use the information cards stored on the pluggable card store in a transaction.
    Type: Application
    Filed: August 22, 2007
    Publication date: September 18, 2008
    Applicant: NOVELL, INC.
    Inventors: Patrick R. Felsted, Andrew A. Hodgkinson, Daniel S. Sanders, James G. Sermersheim, James M. Norman
  • Publication number: 20080229384
    Abstract: A user defines an audit policy. The audit policy identifies one or more triggers that, when related information is included in a security token, trigger the performance of the audit. The audit can include notifying the user in some manner that the trigger occurred. The audit can require in-line confirmation of the audit, so that the security token is not transmitted until the user confirms the audit.
    Type: Application
    Filed: August 22, 2007
    Publication date: September 18, 2008
    Applicant: NOVELL, INC.
    Inventors: Andrew A. Hodgkinson, Duane F. Buss, Thomas E. Doman, Patrick R. Felsted, James G. Sermersheim
  • Publication number: 20080229410
    Abstract: A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
    Type: Application
    Filed: August 22, 2007
    Publication date: September 18, 2008
    Applicant: NOVELL, INC.
    Inventors: Patrick R. Felsted, Thomas E. Doman, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson, Dale R. Olds
  • Publication number: 20080229383
    Abstract: The user can associate metadata with information cards. The metadata can include, among other possibilities, string names, icons, user policies, containers, and hierarchies. The metadata is stored by the computer system. The metadata can then be used to filter the set of information cards that can satisfy a security policy from a relying party.
    Type: Application
    Filed: August 22, 2007
    Publication date: September 18, 2008
    Applicant: NOVELL, INC.
    Inventors: Duane F. Buss, Patrick R. Felsted, Andrew A. Hodgkinson, Daniel S. Sanders
  • Patent number: 7310650
    Abstract: A software tool that is useful when one is attempting to migrate data from one database to another database. In one aspect of the invention, the software tool reduces the complications that may arise when one attempts to migrate data from one Lightweight Directory Access Protocol (LDAP) directory to another LDAP directory, where the schemas for the two directories are not the same.
    Type: Grant
    Filed: February 9, 2005
    Date of Patent: December 18, 2007
    Assignee: Novell, Inc.
    Inventors: Patrick R. Felsted, Timothy S. Larsen
  • Patent number: 6915287
    Abstract: A software tool that is useful when one is attempting to migrate data from one database to another database. In one aspect of the invention, the software tool reduces the complications that may arise when one attempts to migrate data from one Lightweight Directory Access Protocol (LDAP) directory to another LDAP directory, where the schemas for the two directories are not the same.
    Type: Grant
    Filed: December 13, 2001
    Date of Patent: July 5, 2005
    Assignee: Novell, Inc.
    Inventors: Patrick R. Felsted, Timothy Scott Larsen