23 patents
Utility
Transparently Using Origin Isolation to Protect Access Tokens
21 Dec 23
The disclosed technology teaches safely attaching an access token to a browser-based request from a first app loaded by a webpage, without exposing the token to malicious code loaded by the webpage, providing an identity proxy that transparently determines which network requests to relay and a secrets management proxy that provides access tokens transparently to the requests.
Jake Feasel
Filed: 26 Jun 23
Utility
Console-based No-code/low-code Theme Management for Authentication Journeys
21 Sep 23
The disclosed technology teaches integrating theme management of user interfaces that implement an authentication journey for hosted services, receiving user input and responsively configuring a switch block node used in the journey.
Andrew Lawrence HERTEL, Craig GERING, Katy ATKINSON, Colin Madigan DEAN, Michael ELLIOTT, Volker Gunnar SCHEUBER HEINZ, Charles Daniel MASUCCI
Filed: 16 Mar 22
Utility
Secure service isolation between instances of cloud products using a SaaS model
8 Aug 23
The disclosed technology teaches initializing an application instance using a SaaS model in a project implemented on a cloud-based computing service, including running a configuration engine that links a service provider for SaaS application to set configuration parameters for the project and initializing the project in which an application instance will be built, then removing the authorization of the configuration engine to access the project and removing access to set the parameters.
Scott Culp, Beau Croteau, Steve White
Filed: 14 Dec 21
Utility
Identifying Group Membership Through Discharge Macaroon Access Tokens
27 Jul 23
The disclosed technology teaches delegating authorization to access a resource server contingent upon group membership confirmation by a third-party identity management provider.
Neil Edward MADDEN
Filed: 24 Feb 23
Utility
Never Stale Caching of Effective Properties
13 Jul 23
The technology disclosed relates to maintaining a cache of effective properties in an identity management system employing a graph.
Dirk John HOGAN
Filed: 27 Feb 23
Utility
Transparently using origin isolation to protect access tokens
27 Jun 23
The disclosed technology teaches safely attaching an access token to a browser-based request from a first app loaded by a webpage, without exposing the token to malicious code loaded by the webpage, providing an identity proxy that transparently determines which network requests to relay and a secrets management proxy that provides access tokens transparently to the requests.
Jake Feasel
Filed: 12 Sep 19
Utility
Identity Time Machine
20 Apr 23
The disclosed technology teaches a computer-implemented method of enabling identity governance administration to examine the state of identity management objects at an arbitrary prior time.
Sudhakar Peddibhotla, Sandesh More, Peter Barker
Filed: 20 Oct 21
Utility
Role Mining Proximity Analysis for Improved Role-based Access Control
13 Apr 23
The disclosed technology teaches a method of coalescing candidate roles discovered by role mining with active roles that preexisted the role mining, including calculating pairwise proximities between the candidate roles and the active roles by counting differences between pairs over attribute lists for entitlement, driving factors and access patterns, with a penalty for lack of overlap between attribute lists to produce a total difference score.
Aaron Gauldin, Sudhakar Peddibhotla, Peter Barker
Filed: 22 Dec 21
Utility
Secure activation, service mode access and usage control of IOT devices using bearer tokens
14 Mar 23
The disclosed technology teaches providing limited usage of a first device that includes local resources for verifying authenticity of a Macaroon access token with caveats (MATwC), a unique key and a local proximity interface.
Neil Edward Madden
Filed: 17 Dec 20
Utility
Never stale caching of effective properties
28 Feb 23
The technology disclosed relates to maintaining a cache of effective properties in an identity management system employing a graph.
Dirk John Hogan
Filed: 11 Sep 20
Utility
Transparently using macaroons with caveats to delegate authorization for access
28 Feb 23
The disclosed technology teaches confirming delegation of authorization from an authorization server (AS) by a client to a service, including an AS issuing an OAuth2 access token in the form of a Macaroon (MAT), optionally with caveats, including a root signature, and providing the MAT to a client.
Neil Edward Madden
Filed: 17 Dec 20
Utility
Secure deployment confirmation of IOT devices via bearer tokens with caveats
28 Feb 23
The disclosed technology teaches confirming proper deployment of sensors, with an authorization server (AS) issuing to a first client a Macaroon access token (MAT), optionally with caveats, including a root signature, and providing the MAT to a client.
Neil Edward Madden
Filed: 17 Dec 20
Utility
Methods and systems for correctly assembling component sequences
21 Feb 23
The disclosed technology teaches correctly assembling a sequence of components for interacting with a user, including providing a sequence setup GUI with components that accept inputs and have input chain dependencies and outputs.
Jonathan David Branch, Benjamin Anthony Apple, Krismy Alexandra Botkin, Colin Madigan Dean
Filed: 13 Feb 20
Utility
Authentication and Access Management for Heterogeneous Sources of Anomaly Detection Data
18 Aug 22
The disclosed technology teaches aggregating 3rd-party risk measures during an authentication journey, including providing a risk measure aggregation node, a JSON transform, and a configuration for 3rd-party risk measures to request.
Darryl Jones, Benjamin Goodman, Sudhakar Peddibhotla
Filed: 16 Feb 22
Utility
Secure service isolation between instances of cloud products using a SaaS model
31 May 22
The disclosed technology teaches initializing an application instance using a SaaS model in a project implemented on a cloud-based computing service, including running a configuration engine that links a service provider for SaaS application to set configuration parameters for the project and initializing the project in which an application instance will be built, then removing the authorization of the configuration engine to access the project and removing access to set the parameters.
Scott Culp, Beau Croteau, Steve White
Filed: 12 Oct 20
Utility
Systems and Methods for Tuning Containers In a High Availability Environment
31 Mar 22
The disclosed technology teaches tuning containers in pods, in a high availability environment that runs two or more pods to implement a service, while the containers are running, including instrumenting a tunable container to communicate application metrics to a tuning engine that runs in a pod and maintains current configuration state information for the container.
Beau Croteau, Robert Blue, Jeremyah Corner
Filed: 13 Dec 21
Utility
Never Stale Caching of Effective Properties
17 Mar 22
The technology disclosed relates to maintaining a cache of effective properties in an identity management system employing a graph.
Dirk John Hogan
Filed: 11 Sep 20
Utility
Systems and methods for tuning containers in a high availability environment
14 Dec 21
The disclosed technology teaches tuning containers in pods, in a high availability environment that runs two or more pods to implement a service, while the containers are running, including instrumenting a tunable container to communicate application metrics to a tuning engine that runs in a pod and maintains current configuration state information for the container.
Beau Croteau, Robert Blue, Jeremyah Corner
Filed: 21 Oct 19
Utility
Methods and Systems for Correctly Assembling Component Sequences
19 Aug 21
The disclosed technology teaches correctly assembling a sequence of components for interacting with a user, including providing a sequence setup GUI with components that accept inputs and have input chain dependencies and outputs.
Jonathan David Branch, Benjamin Anthony Apple, Krismy Alexandra Botkin, Colin Madigan Dean
Filed: 13 Feb 20
Utility
Systems and Methods for Tuning Containers In a High Availability Environment
22 Apr 21
The disclosed technology teaches tuning containers in pods, in a high availability environment that runs two or more pods to implement a service, while the containers are running, including instrumenting a tunable container to communicate application metrics to a tuning engine that runs in a pod and maintains current configuration state information for the container.
Beau Croteau, Robert Blue, Jeremyah Corner
Filed: 21 Oct 19