Patents by Inventor Steven S. McLain

Steven S. McLain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8387131
    Abstract: Methods and apparatus enforce a secure internet connection from a mobiles endpoint computing device. A security policy for the endpoint is defined based on its location. From that location, an internet connection is established and detected. This event triggers the launching of a full VPN tunnel connection including an NDIS firewall forcing packet traffic through a port of the endpoint computing device assigned by the security policy and/or MAC/IP addresses of a VPN concentrator. Thereafter, the packet traffic is monitored for compliance with the security policy. This includes determining whether packet traffic over the assigned port is observed within a given time or packet traffic is attempted over other ports. Monitoring occurs whether or not the protocol of the VPN tunnel connection is known. Other features contemplate quarantining for improper operation of the VPN tunnel, undertaking remediation, and computer program products, to name a few.
    Type: Grant
    Filed: May 18, 2009
    Date of Patent: February 26, 2013
    Assignee: Novell, Inc.
    Inventors: Brent R. Beachem, Steven S. McLain, Richard B. Rollins, Neil R. Shaw
  • Publication number: 20100293610
    Abstract: Methods and apparatus enforce a secure internet connection from a mobiles endpoint computing device. A security policy for the endpoint is defined based on its location. From that location, an internet connection is established and detected. This event triggers the launching of a full VPN tunnel connection including an NDIS firewall forcing packet traffic through a port of the endpoint computing device assigned by the security policy and/or MAC/IP addresses of a VPN concentrator. Thereafter, the packet traffic is monitored for compliance with the security policy. This includes determining whether packet traffic over the assigned port is observed within a given time or packet traffic is attempted over other ports. Monitoring occurs whether or not the protocol of the VPN tunnel connection is known. Other features contemplate quarantining for improper operation of the VPN tunnel, undertaking remediation, and computer program products, to name a few.
    Type: Application
    Filed: May 18, 2009
    Publication date: November 18, 2010
    Inventors: Brent R. Beachem, Steven S. McLain, Richard B. Rollins, Neil R. Shaw
  • Patent number: 7725428
    Abstract: A system and method is presented for database restoration in a distributed data system. The distributed data system has a first database on a first server which needs restoration. The first database is first restored with a predetermined full backup file, the full backup file being made at a first predetermined time. The first database is then restored with one or more incremental backup files, the incremental backup files being made since the first predetermined time and having the most recent backup file made at a second predetermined time. A transaction log documenting data transactions since the second predetermined time is then examined. One or more transactions listed in the transaction log after the second predetermined time are then executed since they are not included in the incremental backup files.
    Type: Grant
    Filed: July 17, 2002
    Date of Patent: May 25, 2010
    Assignee: Novell, Inc.
    Inventors: Brian Hawkins, Andrew Hodgkinson, Daniel Sanders, Steven S. McLain
  • Patent number: 7072911
    Abstract: A system and method is presented for incremental replication of changes in a state based distributed database synchronization system. If a destination server has one previously established yet unsatisfied synchronization point, a starting synchronization point is formed by extracting the unsatisfied synchronization point from the destination server, identifying a type identifier within the extracted unsatisfied synchronization point identifying a predetermined set of synchronization algorithms and an execution order thereof, identifying a current key within the extracted unsatisfied synchronization point which indicates one of the predetermined set of synchronization algorithms to be started for execution, and adjusting a target state of the destination server to one older than or equal to an established target state specified by the extracted unsatisfied synchronization point.
    Type: Grant
    Filed: July 24, 2002
    Date of Patent: July 4, 2006
    Assignee: Novell, Inc.
    Inventors: Thomas E. Doman, Steven S. McLain, Duane F. Buss
  • Patent number: 6105062
    Abstract: A method and system for moving a subtree of objects from a source location to a destination location. The method includes receiving an input identifying a subtree at a source location. The subtree includes a parent object and exists in a hierarchical tree of objects. The directory includes object containment rules which prohibit certain parent/child relationships among the objects. An input signal identifying a destination location in a destination tree is received. A destination location includes a destination object to which the subtree will be subordinate. The parent object of the subtree is modified to an object type sufficient to comply with object containment rules, and the subtree is moved from the source location to the destination location. The present invention can handle both intra-tree and inter-tree moves of subtrees.
    Type: Grant
    Filed: February 26, 1998
    Date of Patent: August 15, 2000
    Assignee: Novell, Inc.
    Inventors: Cary F. Andrews, David O. Cox, A. Wayne Long, David A. Romanek, Steven S. McLain