Patents by Inventor Robert Skousen Stilmar
Robert Skousen Stilmar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10270741Abstract: A user of a system defines a limited use access token for an external user for that external user to access defined resources of the system based on the user's account with the system. An access control system validates the access token when the external user attempts to access the defined resources and grants the external principal access to the defined resources.Type: GrantFiled: January 25, 2016Date of Patent: April 23, 2019Assignee: NetIQ CorporationInventors: Lloyd Leon Burch, Robert Skousen Stilmar, Duane Fredrick Buss, Baha Masoud
-
Patent number: 10171470Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: GrantFiled: July 31, 2017Date of Patent: January 1, 2019Assignee: NetIQ CorporationInventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Publication number: 20170353464Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: ApplicationFiled: July 31, 2017Publication date: December 7, 2017Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Patent number: 9723007Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: GrantFiled: September 28, 2015Date of Patent: August 1, 2017Assignee: NetIQ CorporationInventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Publication number: 20160173453Abstract: A user of a system defines a limited use access token for an external user for that external user to access defined resources of the system based on the user's account with the system.Type: ApplicationFiled: January 25, 2016Publication date: June 16, 2016Inventors: Lloyd Leon Burch, Robert Skousen Stilmar, Duane Fredrick Buss, Baha Masoud
-
Patent number: 9245103Abstract: A user of a system defines a limited use access token for an external user for that external user to access defined resources of the system based on the user's account with the system. An access control system validates the access token when the external user attempts to access the defined resources and grants the external principal access to the defined resources.Type: GrantFiled: March 31, 2014Date of Patent: January 26, 2016Assignee: NetIQ CorporationInventors: Lloyd Leon Burch, Robert Skousen Stilmar, Duane Fredrick Buss, Baha Masoud
-
Publication number: 20160021113Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: ApplicationFiled: September 28, 2015Publication date: January 21, 2016Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Patent number: 9172701Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: GrantFiled: December 27, 2012Date of Patent: October 27, 2015Assignee: NetIQ CorporationInventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Publication number: 20150278500Abstract: A user of a system defines a limited use access token for an external user for that external user to access defined resources of the system based on the user's account with the system. An access control system validates the access token when the external user attempts to access the defined resources and grants the external principal access to the defined resources.Type: ApplicationFiled: March 31, 2014Publication date: October 1, 2015Applicant: Novell, Inc.Inventors: Lloyd Leon Burch, Robert Skousen Stilmar, Duane Fredrick Buss, Baha Masoud
-
Publication number: 20140189775Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: ApplicationFiled: December 27, 2012Publication date: July 3, 2014Applicant: Novell, Inc.Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Patent number: 8302161Abstract: Techniques are presented for anonymous Internet access. Internet requests are intercepted within a firewalled environment before being routed over the Internet to destination sites. Each Internet requests is evaluated in view of policy and one or more anonymizers are selected in response to that evaluation. The Internet requests are then routed through the appropriate anonymizers for processing to the destination sites. A relationship between an Internet Protocol (IP) address associated with the firewalled environment and IP addresses of the destination sites is masked and hidden via the anonymizers from Internet observers. Moreover, a secure communication between the firewalled environment and the anonymizers is maintained.Type: GrantFiled: February 25, 2008Date of Patent: October 30, 2012Assignee: EMC CorporationInventors: Lloyd Leon Burch, Douglas G. Earl, Robert Skousen Stilmar, Stephen R. Carter
-
Patent number: 8301876Abstract: Techniques for secure network communication are provided. Credentials for a user along with a transparently generated secret are sent to a resource that the user desires to establish a secure communication session with. After successful authentication of the user, an initial sequence number for a first transaction of the session is set on a client of the user. Thereafter, with each transaction of the session the client supplies a new and unique sequence number to a server of the resource and uses the secret to encode and validate that transaction. The server of the resource does not permit any transaction that includes an invalid or previously used sequence number.Type: GrantFiled: May 16, 2008Date of Patent: October 30, 2012Assignee: EMC CorporationInventors: Lloyd Leon Burch, Prakash Umasankar Mukkara, Robert Skousen Stilmar, Douglas Garry Earl
-
Publication number: 20090319776Abstract: Techniques for secure network communication are provided. Credentials for a user along with a transparently generated secret are sent to a resource that the user desires to establish a secure communication session with. After successful authentication of the user, an initial sequence number for a first transaction of the session is set on a client of the user. Thereafter, with each transaction of the session the client supplies a new and unique sequence number to a server of the resource and uses the secret to encode and validate that transaction. The server of the resource does not permit any transaction that includes an invalid or previously used sequence number.Type: ApplicationFiled: May 16, 2008Publication date: December 24, 2009Inventors: Lloyd Leon Burch, Prakash Umasankar Mukkara, Robert Skousen Stilmar, Douglas Garry Earl
-
Publication number: 20090217351Abstract: Techniques are presented for anonymous Internet access. Internet requests are intercepted within a firewalled environment before being routed over the Internet to destination sites. Each Internet requests is evaluated in view of policy and one or more anonymizers are selected in response to that evaluation. The Internet requests are then routed through the appropriate anonymizers for processing to the destination sites. A relationship between an Internet Protocol (IP) address associated with the firewalled environment and IP addresses of the destination sites is masked and hidden via the anonymizers from Internet observers. Moreover, a secure communication between the firewalled environment and the anonymizers is maintained.Type: ApplicationFiled: February 25, 2008Publication date: August 27, 2009Inventors: Lloyd Leon Burch, Douglas G. Earl, Robert Skousen Stilmar, Stephen R. Carter
-
Patent number: 7334257Abstract: Techniques are provided for preserving content during a network transaction. A client issues a content-bearing request to a desired service. At the time the request is issued, the client is not authenticated to the service. The content associated with the content-bearing request is preserved and associated with a modified request. The modified request and a redirection to an authentication service are sent to the client. The client authenticates and transparently sends the modified request. The modified request is used for reacquiring the content. The content-bearing request along with the content are sent to the desired service for processing.Type: GrantFiled: October 31, 2003Date of Patent: February 19, 2008Assignee: Novell, Inc.Inventors: Hashem Mohammad Ebrahimi, Baber Amin, Stephen R Carter, Scott William Pathakis, Robert Skousen Stilmar