About
- Designed and lead the development of 6 products from the ground up, three of them earn…
Articles by Hal
Activity
-
I am thrilled to join @Celonis. I’ve long admired its pioneering products, rapid innovation, and ability to deliver transformative results for…
I am thrilled to join @Celonis. I’ve long admired its pioneering products, rapid innovation, and ability to deliver transformative results for…
Liked by Hal Howard
-
Feeling GRATEFUL for all YOUR LinkedIn birthday wishes during my Leo birthday week in sunshine filled Seattle where I mixed work with friends, family…
Feeling GRATEFUL for all YOUR LinkedIn birthday wishes during my Leo birthday week in sunshine filled Seattle where I mixed work with friends, family…
Liked by Hal Howard
Experience
Education
Patents
-
DASHBOARD WITH PANORAMIC DISPLAY OF ORDERED CONTENT
Issued US
A role-based dashboard display is generated, showing a plurality of different display sections that display information from a computer system. The display sections include a customer-branded section, a favorites section, a workspace display section and a live data feed section. The sections have display elements linked to underlying data.
-
DASHBOARD WITH SELECTABLE WORKSPACE REPRESENTATIONS
Issued US
A role-based dashboard display is generated, showing a plurality of different display sections that display information from a computer system. A workspace display section includes a plurality of different workspace display elements, each showing information specific to a different workspace corresponding to a user's role. A selection user input mechanism receives user actuation to change a visual representation of the different workspace display items.
-
User support experience with automated generated virtual environment in public cloud infrastructure
Issued US
-
Accessing a server using a user authentication indicator
Issued US 7,590,731
A mechanism for seeking access of a client to a first server is described. The mechanism involves determining that a client seeking access to the first server is not authenticated by an authentication server. The mechanism further involves communicating a request for login information to be returned to the second server from the client. Login information is received at the authentication server from the client. The client is authenticated by comparing the login information with authentication…
A mechanism for seeking access of a client to a first server is described. The mechanism involves determining that a client seeking access to the first server is not authenticated by an authentication server. The mechanism further involves communicating a request for login information to be returned to the second server from the client. Login information is received at the authentication server from the client. The client is authenticated by comparing the login information with authentication information maintained by the authentication server. When the login information matches the authentication information, a user authentication indicator is generated at the authentication server and the user sends the authentication indicator to the first server.
-
Session key security protocol
Issued US 7,971,240
Exchanging information in a multi-site authentication system. A network server receives, from an authentication server, a request by a client computing device for a service provided by the network server along with an authentication ticket. The authentication ticket includes: a session key encrypted by a public key associated with the network server, message content encrypted by the session key, and a signature for the encrypted session key and the encrypted message content. The signature…
Exchanging information in a multi-site authentication system. A network server receives, from an authentication server, a request by a client computing device for a service provided by the network server along with an authentication ticket. The authentication ticket includes: a session key encrypted by a public key associated with the network server, message content encrypted by the session key, and a signature for the encrypted session key and the encrypted message content. The signature includes address information of the network server. The network server identifies its own address information in the signature to validate the signature included in the authentication ticket and verifies the authentication ticket content based on the signature included in the authentication ticket. The network server decrypts the encrypted session key via a private key associated with the second network server and decrypts the encrypted message content via the decrypted session key.
-
Transparent authentication using an authentication server
Issued US 7,421,731
A user, by way of a computing device, requests and receives content from a first server at the computing device. An authentication response is also received from the first server at the computing device of the user. The authentication response includes an address of the second server and an executable script. The computing device of the user executes the executable script by issuing a request to the second server for state information corresponding to the user, receiving the state information…
A user, by way of a computing device, requests and receives content from a first server at the computing device. An authentication response is also received from the first server at the computing device of the user. The authentication response includes an address of the second server and an executable script. The computing device of the user executes the executable script by issuing a request to the second server for state information corresponding to the user, receiving the state information from the second server; and determining, based on the state information, whether the user is authenticated to the second server. If the user is not authenticated to the second server, the computer device of the user displays a login module that is visually associated with the first server. Such login module collects login information for authenticating the user to the second server. If the user is authenticated in the second server, the computing device of the user issues a request to the second server for vouching information for authenticating the user to the first server.
Other inventorsSee patent -
Authentication broker service
Issued US US7607008 B2
A user is authenticated for a relying computing entity (e.g., an enterprise) through an authentication broker service, wherein a trust relationship exists between the relying computing entity and the authentication broker service. The authentication broker service has a trust relationship with the relying computing entity and the authentication service that issued the identity of the user. The relying computing entity asks the authentication broker service to authenticate the identity of the…
A user is authenticated for a relying computing entity (e.g., an enterprise) through an authentication broker service, wherein a trust relationship exists between the relying computing entity and the authentication broker service. The authentication broker service has a trust relationship with the relying computing entity and the authentication service that issued the identity of the user. The relying computing entity asks the authentication broker service to authenticate the identity of the user. The authentication broker service captures the user's credential (or directs the authentication service to do so) and sends an authentication response (e.g., a token) to the relying computing entity in order to authenticate the identity of the user to the relying computing entity. The relying computing entity verifies the authentication response based on the trust relationship between the relying computing entity and the authentication broker service.
Other inventorsSee patent -
Controlling access to a network server using an authentication ticket
Issued US 6,678,731
A system determines whether to grant a user access to a network server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user is authenticated by the authentication server, then the network server is notified that the user is authenticated through the use of an…
A system determines whether to grant a user access to a network server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user is authenticated by the authentication server, then the network server is notified that the user is authenticated through the use of an authentication ticket, and the network server grants the network server user access. If the user is not authenticated by the authentication server, then login information is retrieved from the user and compared to authentication information maintained by the authentication server. If the retrieved login information matches the authentication information, then the network server is notified that the user is authenticated by using the authentication ticket.
Other inventorsSee patent -
Authenticating user access to a network server without communicating user authentication cookie to the network server
Issued US 7,016,960
A system determines whether to grants access to a network server by a user. Initially, a user attempts to gain access to a network server, such as a web server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user was already authenticated by the authentication server, then…
A system determines whether to grants access to a network server by a user. Initially, a user attempts to gain access to a network server, such as a web server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user was already authenticated by the authentication server, then the network server is notified that the user is authenticated. The network server then grants the user access to the network server. If the user was not already authenticated by the authentication server, then login information is retrieved from the user and compared to authentication information maintained by the authentication server. If the retrieved login information matches the authentication information, then the network server is notified that the user is authenticated. The retrieved login information and the authentication information is concealed from the network server. If the user is authenticated, then a user profile is communicated to the network server along with the notification that the user is authenticated. If the user is successfully authenticated, then a cookie is provided to an Internet browser operated by the user. The cookie contains information regarding user authentication, the user's profile, and a list of network servers previously visited by the user.
Other inventorsSee patent -
Authenticating access to a network server without communicating login information through the network server
Issued US 6,584,505
A system determines whether to grants access to a network server by a user. Initially, a user attempts to gain access to a network server, such as a web server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user was already authenticated by the authentication server, then…
A system determines whether to grants access to a network server by a user. Initially, a user attempts to gain access to a network server, such as a web server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user was already authenticated by the authentication server, then the network server is notified that the user is authenticated. The network server then grants the user access to the network server. If the user was not already authenticated by the authentication server, then login information is retrieved from the user and compared to authentication information maintained by the authentication server. If the retrieved login information matches the authentication information, then the network server is notified that the user is authenticated. The retrieved login information and the authentication information is concealed from the network server. If the user is authenticated, then a user profile is communicated to the network server along with the notification that the user is authenticated. If the user is successfully authenticated, then a cookie is provided to an Internet browser operated by the user. The cookie contains information regarding user authentication, the user's profile, and a list of network servers previously visited by the user.
Other inventorsSee patent -
Moving a messaging system mailbox
Issued US 5,915,004
A messaging system user's mailbox is moved using a method in which the mailbox is flagged as being moved and a message arriving for the user during the move is delivered to a holding area to await re-delivery to the mailbox after the move is completed. A combination of non-volatile memory and volatile memory is used to ensure the message's delivery in the event of a power loss or other system failure.
Other inventors -
Languages
-
French
-
More activity by Hal
-
🌟 Exciting News from Our Family! 🌟 When my son Maximilian discussed his college plans to study Philosophy and Computer Science, I was honestly…
🌟 Exciting News from Our Family! 🌟 When my son Maximilian discussed his college plans to study Philosophy and Computer Science, I was honestly…
Liked by Hal Howard
-
Thank you to Hal Howard and family for hosting and R "Ray" Wang for coordinating this meeting of the minds back in 2022 w/ Jim DuBois, Nikhil Hasija,…
Thank you to Hal Howard and family for hosting and R "Ray" Wang for coordinating this meeting of the minds back in 2022 w/ Jim DuBois, Nikhil Hasija,…
Liked by Hal Howard
-
Back in 2022, it was great to learn more about the history behind Brian Carter Cellars, understand #innovation, architecture/taste choices, and…
Back in 2022, it was great to learn more about the history behind Brian Carter Cellars, understand #innovation, architecture/taste choices, and…
Liked by Hal Howard
-
Let's get this 10th birthday party started, shall we?!! #ESPodcast reached its 10th birthday today(!), having published quasi-regularly since our…
Let's get this 10th birthday party started, shall we?!! #ESPodcast reached its 10th birthday today(!), having published quasi-regularly since our…
Liked by Hal Howard
-
I'm starting an Advanced Dungeons and Dynamics 365 adventure campaign with the 10.0.39 rule set.
I'm starting an Advanced Dungeons and Dynamics 365 adventure campaign with the 10.0.39 rule set.
Liked by Hal Howard
-
This week I was interviewed by Lasse Møller at the season wrap-up event for the 2023/2024 Conflux mentoring program. The topic for the interview was…
This week I was interviewed by Lasse Møller at the season wrap-up event for the 2023/2024 Conflux mentoring program. The topic for the interview was…
Liked by Hal Howard
-
The death of software companies is rarely the engineering team. It's the product team. That is why the CTO in startups should be in charge of both…
The death of software companies is rarely the engineering team. It's the product team. That is why the CTO in startups should be in charge of both…
Liked by Hal Howard
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Hal Howard in United States
-
Hal Howard
-
Hal Howard
Senior Vice President, Procurement at Global Tel*Link
-
Hal Chamberlin
Sound Synthesis Scientist, Retired at Sigma Sounds, Consultant on occasion
-
Hal Howard
Senior Vice President- Procurement at GTL Inc
24 others named Hal Howard in United States are on LinkedIn
See others named Hal Howard