Patents by Inventor W. Scott Kiester

W. Scott Kiester has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8806581
    Abstract: Methods and apparatus include securely launching a web browser from a privileged process of a workstation to minimize enterprise vulnerabilities. The workstation includes a restricted-capability web browser pointed toward a web server. An executable file is wrapped about the browser and imposes restrictions, such as preventing the writing to a registry or installing ActiveX controls. It also has functionality to prevent users from linking to web locations in other than an https protocol or following links beyond an original host. Upon indication of a forgotten password/credential, the restricted-capability web is launched browser toward a web server. Upon authentication of identity, the user changes their password/credential for later logging-on to the workstation, but in a capacity without the limited functionality or the imposed browser restrictions.
    Type: Grant
    Filed: February 6, 2012
    Date of Patent: August 12, 2014
    Assignee: Apple Inc.
    Inventors: W. Scott Kiester, Cameron Mashayekhi, Karl E. Ford
  • Publication number: 20120137351
    Abstract: Methods and apparatus include securely launching a web browser from a privileged process of a workstation to minimize enterprise vulnerabilities. The workstation includes a restricted-capability web browser pointed toward a web server. An executable file is wrapped about the browser and imposes restrictions, such as preventing the writing to a registry or installing ActiveX controls. It also has functionality to prevent users from linking to web locations in other than an https protocol or following links beyond an original host. Upon indication of a forgotten password/credential, the restricted-capability web is launched browser toward a web server. Upon authentication of identity, the user changes their password/credential for later logging-on to the workstation, but in a capacity without the limited functionality or the imposed browser restrictions.
    Type: Application
    Filed: February 6, 2012
    Publication date: May 31, 2012
    Inventors: W. Scott Kiester, Cameron Mashayekhi, Karl E. Ford
  • Patent number: 8117650
    Abstract: Apparatus and methods are described for providing employee cards to employees, such as PIV cards to federal employees, including provisioning the employees to a more than one agency (and more than one card) without requiring multiple instances of enrolling and adjudicating the employee. Representatively, a sponsor enters information about the employee into a computer-displayed form (e.g., web-based). Biometric identity information is collected for the employee, but if such has already begun or is complete for at least a first agency, the collected information is used for a second agency without redundant collection. In the event an adjudication level of the first agency is at least as stringent as it is for the second agency, the employee is eligible to receive an employee card for the second agency, in addition to an employee card for the first agency.
    Type: Grant
    Filed: October 4, 2007
    Date of Patent: February 14, 2012
    Assignee: Novell Intellectual Property Holdings, Inc.
    Inventors: W. Scott Kiester, Cameron Mashayekhi, Karl E. Ford
  • Patent number: 8112791
    Abstract: Methods and apparatus include securely launching a web browser from a privileged process of a workstation to minimize enterprise vulnerabilities. The workstation includes a web browser pointed toward a web server and a Logon API for use with a password/credential. An executable file is wrapped about the browser and imposes restrictions, such as preventing the writing to a registry or installing ActiveX controls. It also has functionality to prevent users from linking to web locations in other than an https protocol or following links beyond an original host. Upon indication of a forgotten password/credential, a DLL logs onto a user account which invokes the executable file to launch the web browser in the https protocol. Upon authentication of identity, the user changes their password/credential for later logging-on to the workstation via the Logon API, but in a capacity without the limited functionality or the imposed browser restrictions.
    Type: Grant
    Filed: November 14, 2007
    Date of Patent: February 7, 2012
    Inventors: W. Scott Kiester, Cameron Mashayekhi, Karl E. Ford
  • Patent number: 7793340
    Abstract: Methods and apparatus cryptographically bind authentication schemes to verify that a secure authentication sequence was executed for access to sensitive applications/resources. Users execute two login sequences with a strong authentication framework. Upon completion of the first, the framework generates an unencrypted token from underlying data, later hashed into an authentication token. With a private key corresponding to the first sequence, the authentication token is encrypted and passed to the second sequence where it is encrypted again with a private key corresponding to the second sequence. Upon access attempts to the sensitive applications/resources, verification of execution of the two login sequences includes recovering the authentication token from its twice encrypted form and comparing it to a comparison token independently generated by the application/resource via the underlying data. An audit log associated with the application/resource stores the data, the recovered authentication token, etc.
    Type: Grant
    Filed: November 21, 2007
    Date of Patent: September 7, 2010
    Assignee: Novell, Inc.
    Inventors: W. Scott Kiester, Cameron Mashayekhi, Karl E. Ford
  • Publication number: 20090193247
    Abstract: Methods and apparatus provide tunneling one authentication framework over a more widely accepted framework (e.g., EAP). In this manner, pluralities of strong authentication protocols are wirelessly enabled between a supplicant and server that are not otherwise wirelessly enabled. During use, packets are wirelessly transmitted and received between the supplicant and server according to EAP's prescribed message format, including a wireless access point. In a tunnel, various authentication protocols form the payload component of the message format which yields execution capability of more than one protocol, instead of the typical single protocol authentication. Certain tunneled frameworks include NMAS, LDAP/SASL, Open LDAP/SLAPD, or IPSEC. Computer program products, computing systems and various interaction between the supplicant and server are also disclosed.
    Type: Application
    Filed: January 29, 2008
    Publication date: July 30, 2009
    Inventors: W. Scott Kiester, Cameron Mashayekhi, Karl E. Ford
  • Publication number: 20090183255
    Abstract: Methods and apparatus provide server services on a client for disconnected login on the client. Users execute a connected login sequence between the client and the server according to one of many strong authentication protocols. During such time, information on the server necessary for a successful execution of the strong authentication protocol is determined and provided to the client where it is stored in a local instance. Users thereafter disconnect from the server and login locally on the client Login information, locally provided, is verified against the information of the server so provided to the client. In this manner, users can be authenticated with a strong protocol, beyond mere password information. They can be strongly authenticated when logging-in to a laptop computing device, for example, when in a location not able to connect to a network appliance, such as a server.
    Type: Application
    Filed: December 21, 2007
    Publication date: July 16, 2009
    Inventors: W. Scott Kiester, Larry H. Henderson, Karl E. Ford
  • Publication number: 20090144450
    Abstract: Apparatus and methods are described for synching data of multiple connected systems according to business policies utilized for common computing goals, such as identity management. A plurality of connectors interface with a corresponding one of the computing systems and have at least one object or attribute indicative of a status of an aspect of the common computing goals. A central connector interfaces with each of the connectors and encapsulates the entirety of business policies in a single location. It also monitors changes in the objects or attributes and, if detected, pushes data to a connector for pushing to its corresponding computing system. In this manner, data from all systems flows through the central connector and overcomes prior problems of business policies being located piecemeal in a variety of connectors, which may need swapping. Computer program products, computing systems, retrofits to existing software, to name a few, are other features.
    Type: Application
    Filed: November 29, 2007
    Publication date: June 4, 2009
    Inventors: W. Scott Kiester, Mark J. Worwetz, Karl E. Ford
  • Publication number: 20090132828
    Abstract: Methods and apparatus cryptographically bind authentication schemes to verify that a secure authentication sequence was executed for access to sensitive applications/resources. Users execute two login sequences with a strong authentication framework. Upon completion of the first, the framework generates an unencrypted token from underlying data, later hashed into an authentication token. With a private key corresponding to the first sequence, the authentication token is encrypted and passed to the second sequence where it is encrypted again with a private key corresponding to the second sequence. Upon access attempts to the sensitive applications/resources, verification of execution of the two login sequences includes recovering the authentication token from its twice encrypted form and comparing it to a comparison token independently generated by the application/resource via the underlying data. An audit log associated with the application/resource stores the data, the recovered authentication token, etc.
    Type: Application
    Filed: November 21, 2007
    Publication date: May 21, 2009
    Inventors: W. Scott Kiester, Cameron Mashayekhi, Karl E. Ford
  • Publication number: 20090125986
    Abstract: Methods and apparatus include securely launching a web browser from a privileged process of a workstation to minimize enterprise vulnerabilities. The workstation includes a web browser pointed toward a web server and a Logon API for use with a password/credential. An executable file is wrapped about the browser and imposes restrictions, such as preventing the writing to a registry or installing ActiveX controls. It also has functionality to prevent users from linking to web locations in other than an https protocol or following links beyond an original host. Upon indication of a forgotten password/credential, a DLL logs onto a user account which invokes the executable file to launch the web browser in the https protocol. Upon authentication of identity, the user changes their password/credential for later logging-on to the workstation via the Logon API, but in a capacity without the limited functionality or the imposed browser restrictions.
    Type: Application
    Filed: November 14, 2007
    Publication date: May 14, 2009
    Inventors: W. Scott Kiester, Cameron Mashayekhi, Karl E. Ford
  • Publication number: 20090094161
    Abstract: Apparatus and methods are described for providing employee cards to employees, such as PIV cards to federal employees, including provisioning the employees to a more than one agency (and more than one card) without requiring multiple instances of enrolling and adjudicating the employee. Representatively, a sponsor enters information about the employee into a computer-displayed form (e.g., web-based). Biometric identity information is collected for the employee, but if such has already begun or is complete for at least a first agency, the collected information is used for a second agency without redundant collection. In the event an adjudication level of the first agency is at least as stringent as it is for the second agency, the employee is eligible to receive an employee card for the second agency, in addition to an employee card for the first agency.
    Type: Application
    Filed: October 4, 2007
    Publication date: April 9, 2009
    Inventors: W. Scott Kiester, Cameron Mashayekhi, Karl E. Ford