Patents by Inventor Stephen R Carter

Stephen R Carter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8914481
    Abstract: Techniques for spontaneous resource management are provided. Information about resources is indexed and housed in a repository. The information is dynamically updated. Search queries are performed against the indexed information in the repository for purposes of forming dynamic groupings of the resources that are then managed as custom-defined and dynamic groups.
    Type: Grant
    Filed: October 24, 2008
    Date of Patent: December 16, 2014
    Assignee: Novell, Inc.
    Inventors: Scott Alan Isaacson, Stephen R Carter, Tammy Anita Green
  • Publication number: 20140365656
    Abstract: Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds. Policy actions are enforced when processing the messages. The policy actions can include identity-based restrictions and the policy actions are specific to the messages and/or clouds within which the messages are being processed.
    Type: Application
    Filed: July 31, 2014
    Publication date: December 11, 2014
    Inventors: Bruce L. Bergeson, Carolyn B. McClain, Stephen R. Carter, Vernon Roger Holm
  • Publication number: 20140359132
    Abstract: Techniques for policy and identity-based workload provisioning are presented. Identities for requestors or workloads and identities for workloads are tied to specific policies. The specific policies are evaluated based on a stage of readiness for resources within a resource pool and based on resource identities for the resources within the resource pool. Resources are then dynamically provisioned based on the identity-based policy evaluation to handle workloads from the resource pool.
    Type: Application
    Filed: July 21, 2014
    Publication date: December 4, 2014
    Inventors: Gregory Matthew Haskins, David H. Bahi, Daniel Edward Westervelt, Jonathan Paul Bultmeyer, Stephen R. Carter
  • Publication number: 20140351894
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Application
    Filed: August 13, 2014
    Publication date: November 27, 2014
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R. Carter
  • Publication number: 20140344461
    Abstract: Techniques for intelligent service deployment are provided. Cloud and service data are evaluated to develop a service deployment plan for deploying a service to a target cloud processing environment. When dictated by the plan or by events that trigger deployment, the service is deployed to the target cloud processing environment in accordance with the service deployment plan.
    Type: Application
    Filed: July 31, 2014
    Publication date: November 20, 2014
    Inventors: Stephen R. Carter, Jason Allen Sabin, Michael John Jorgensen, Nathaniel Brent Kranendonk, Kal A. Larsen
  • Publication number: 20140282547
    Abstract: Methods and apparatus involve extending functionality of legacy services. A legacy application has functionality designed for use on an original computing device. In a modern environment, virtual machines (VMs) operate as independent guests on processors and memory by way of scheduling control from a virtualization layer (e.g., hypervisor). At least one VM is provisioned to modify standard entry points of the original legacy application for new accessing of various system functions of the hardware platform. Representative functions include network access, processors, and storage. Policy decision points variously located are further employed to ensure compliance with computing policies. Multiple platforms and computing clouds are contemplated as are VMs in support roles and dedicated software appliances. In this manner, continued use of legacy services in modern situations allows participation in more capable environments and application capabilities heretofore unimagined.
    Type: Application
    Filed: May 20, 2014
    Publication date: September 18, 2014
    Applicant: Novell, Inc.
    Inventors: Kattiganehalli Y. Srinivasan, Stephen R. Carter, Carolyn B. McClain, Jonathon P. Bultmeyer
  • Patent number: 8838652
    Abstract: Techniques for application data scrubbing, reporting, and analysis are presented. A plurality of data sources are analyzed in accordance with their schemas and matching rules. Merging rules are applied to merge a number of data types across the data sources together. A report is produced for inspection and a master data source is generated. The processing can be iterated with rules modified in response to the report for purposes of refining the master data source.
    Type: Grant
    Filed: March 18, 2008
    Date of Patent: September 16, 2014
    Assignee: Novell, Inc.
    Inventors: Nathan Blaine Jensen, Volker Gunnar Scheuber-Heinz, Stephen R Carter, Charles Matthew Morgan
  • Patent number: 8813192
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Grant
    Filed: May 4, 2011
    Date of Patent: August 19, 2014
    Assignee: Novell, Inc.
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R Carter
  • Patent number: 8806566
    Abstract: Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds. Policy actions are enforced when processing the messages. The policy actions can include identity-based restrictions and the policy actions are specific to the messages and/or clouds within which the messages are being processed.
    Type: Grant
    Filed: March 18, 2010
    Date of Patent: August 12, 2014
    Assignee: Novell, Inc.
    Inventors: Bruce L. Bergeson, Carolyn B. McClain, Stephen R Carter, Vernon Roger Holm
  • Patent number: 8806499
    Abstract: Mechanisms to build dynamic locations to reduce brittleness in a team environment are provided. A project includes resources, each resource is assigned a key. Each key is mapped to a current location for its corresponding resource. The keys and locations are maintained in an index. Locations for the resources can change as desired throughout the lifecycle of the project and as changes occur the index is updated. When references are made within the project to the resources, the references are translated to the keys, if necessary. The keys are then used for accessing the index and dynamically acquiring the current locations for the resources at the time the references are made.
    Type: Grant
    Filed: May 15, 2008
    Date of Patent: August 12, 2014
    Assignee: Novell, Inc.
    Inventors: Brent Thurgood, Lee Edward Lowry, Zack Grossbart, Stephen R Carter
  • Patent number: 8806014
    Abstract: Techniques for intelligent service deployment are provided. Cloud and service data are evaluated to develop a service deployment plan for deploying a service to a target cloud processing environment. When dictated by the plan or by events that trigger deployment, the service is deployed to the target cloud processing environment in accordance with the service deployment plan.
    Type: Grant
    Filed: May 28, 2010
    Date of Patent: August 12, 2014
    Assignee: Novell, Inc.
    Inventors: Stephen R Carter, Jason Allen Sabin, Michael John Jorgensen, Nathaniel Brent Kranendonk, Kal A. Larsen
  • Patent number: 8787391
    Abstract: Techniques for using the network as a memory device are provided. Network packets continue to circulate on a network using the network communication channel as a memory device. Nodes of the network are configured to selectively copy, use, verify, modify, create, and purge the network packets using file management semantics.
    Type: Grant
    Filed: October 22, 2009
    Date of Patent: July 22, 2014
    Assignee: Novell, Inc.
    Inventor: Stephen R Carter
  • Patent number: 8788669
    Abstract: Techniques for policy and identity-based workload provisioning are presented. Identities for requestors or workloads and identities for workloads are tied to specific policies. The specific policies are evaluated based on a stage of readiness for resources within a resource pool and based on resource identities for the resources within the resource pool. Resources are then dynamically provisioned based on the identity-based policy evaluation to handle workloads from the resource pool.
    Type: Grant
    Filed: January 3, 2011
    Date of Patent: July 22, 2014
    Assignee: Novell, Inc.
    Inventors: Gregory Matthew Haskins, David H. Bahi, Daniel Edward Westervelt, Jonathan Paul Bultmeyer, Stephen R Carter
  • Patent number: 8782765
    Abstract: Techniques for environment single sign on are provided. Multiple identifiers for devices are associated as a single environment. A principal can be authenticated via any of the devices once to access protected resources and once authenticated the principal can access the protected resources from the other devices without re-authenticating.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: July 15, 2014
    Assignee: Novell, Inc.
    Inventors: Nathaniel Kranendonk, Stephen R Carter
  • Patent number: 8782734
    Abstract: Methods and apparatus teach defining an access policy to digital data available on one or more computing devices, including identifying one or more semantic attributes of at least one first digital data set and using the identified attributes to define policy dictating user access privileges. On receipt of a user request to access at least one second digital data set, semantic attributes are compared to the at least one first digital data set and access is allowed or not allowed based on the policy. Semantic attributes are selected from at least one of a closeness attribute, a relatedness attribute, and a semantic vector attribute. Also is taught configuring a policy enforcement agent on the one or more computing devices to undertake the comparing and to allow or not allow access. In turn, computer program products and computing systems for accomplishing the foregoing are provided.
    Type: Grant
    Filed: January 14, 2011
    Date of Patent: July 15, 2014
    Assignee: Novell, Inc.
    Inventors: Scott A. Isaacson, John Melvin Antony, Stephen R. Carter
  • Publication number: 20140195292
    Abstract: Techniques for project management instantiation and configuration are provided. A master project includes policy directives that drive the dynamic instantiation and configuration of resources for a project. The resources are instantiated and configured on demand and when resources are actually requested, in response to the policy directives.
    Type: Application
    Filed: January 6, 2014
    Publication date: July 10, 2014
    Applicant: Novell, Inc.
    Inventors: Michel Shane Simpson, Volker Gunnar Scheuber-Heinz, Lee Edward Lowry, Stephen R. Carter
  • Publication number: 20140192644
    Abstract: Techniques for privileged network routing are provided. As traffic is received at a gateway of a network backbone provider environment it is interrogated for predefined criteria. If the traffic satisfies the predefined criteria, then the information is routed within the network backbone provider environment to use a set of reserved and restricted resources to provide premium service for the traffic being routed through the network backbone provider environment.
    Type: Application
    Filed: March 17, 2014
    Publication date: July 10, 2014
    Applicant: Novell, Inc.
    Inventors: Stephen R. Carter, Dipto Chakravarty
  • Patent number: 8776198
    Abstract: Techniques for non-unique identity establishment are presented. A plurality of biometric data associated with a user is acquired from a plurality of biometric devices. The intersection of the biometric data is registered or a vector for the biometric data is registered. This information is also registered along with answers to questions provided by the user. When a user attempts to subsequently access a secure resource of a network, the retained information is compared against user-supplied biometric data and in some cases where appropriate user-supplied answers to establish an identity of the user and to authenticate the user for access to the secure resource.
    Type: Grant
    Filed: February 1, 2008
    Date of Patent: July 8, 2014
    Assignee: Oracle International Corporation
    Inventors: Zhanna A. Tsitkova, Stephen R. Carter, Tammy Anita Green, Lloyd Leon Burch
  • Patent number: 8756597
    Abstract: Methods and apparatus involve extending functionality of legacy services. A legacy application has functionality designed for use on an original computing device. In a modern environment, virtual machines (VMs) operate as independent guests on processors and memory by way of scheduling control from a virtualization layer (e.g., hypervisor). At least one VM is provisioned to modify standard entry points of the original legacy application for new accessing of various system functions of the hardware platform. Representative functions include network access, processors, and storage. Policy decision points variously located are further employed to ensure compliance with computing policies. Multiple platforms and computing clouds are contemplated as are VMs in support roles and dedicated software appliances. In this manner, continued use of legacy services in modern situations allows participation in more capable environments and application capabilities heretofore unimagined.
    Type: Grant
    Filed: February 5, 2010
    Date of Patent: June 17, 2014
    Assignee: Novell, Inc.
    Inventors: Kaltiganehalli Y. Srinivasan, Stephen R. Carter, Carolyn B. McClain, Jonathan P. Bultmeyer
  • Publication number: 20140156357
    Abstract: Techniques for help desk management are provided. A user's experience with a resource is captured via a rating. The rating is recorded along with other metrics associated with a processing environment of the user and proactive action taken in response to configuration or performance problems with the user.
    Type: Application
    Filed: February 7, 2014
    Publication date: June 5, 2014
    Applicant: Novell, Inc.
    Inventors: Tammy Anita Green, Stephen R. Carter, Scott Alan Isaacson, Eric W. B. Anderson