Hal Howard

Hal Howard

Las Vegas, Nevada, United States
6K followers 500+ connections

About

- Designed and lead the development of 6 products from the ground up, three of them earn…

Articles by Hal

  • New LinkedIn buttons in Komiko

    New LinkedIn buttons in Komiko

    Komiko has always been an account managers best friend and now it's even easier to get up to speed on the newest…

    3 Comments
  • Are you losing before you even start the renewal process?

    Are you losing before you even start the renewal process?

    Working with our customers, we analyzed 7,432 renewal opportunities across a variety of different businesses and the…

    1 Comment
  • From Concept to ShortList

    From Concept to ShortList

    In early 2015, Ami Heitner and I formed Komiko to pursue creating business tools that took advantage of modern data…

    14 Comments
See all articles

Activity

Join now to see all activity

Experience

  • ZoomInfo Graphic

    ZoomInfo

    Bellevue, WA

  • -

  • -

  • -

    Redmond, WA

  • -

    Bellevue, WA

  • -

  • -

    Redmond, WA

  • -

    Redmond, WA

  • -

    Redmond, WA

  • -

    Redmond, WA

  • -

    Redmond, WA

  • -

    Lewisport, KY

Education

Patents

  • DASHBOARD WITH PANORAMIC DISPLAY OF ORDERED CONTENT

    Issued US

    A role-based dashboard display is generated, showing a plurality of different display sections that display information from a computer system. The display sections include a customer-branded section, a favorites section, a workspace display section and a live data feed section. The sections have display elements linked to underlying data.

    See patent
  • DASHBOARD WITH SELECTABLE WORKSPACE REPRESENTATIONS

    Issued US

    A role-based dashboard display is generated, showing a plurality of different display sections that display information from a computer system. A workspace display section includes a plurality of different workspace display elements, each showing information specific to a different workspace corresponding to a user's role. A selection user input mechanism receives user actuation to change a visual representation of the different workspace display items.

    See patent
  • User support experience with automated generated virtual environment in public cloud infrastructure

    Issued US

  • Accessing a server using a user authentication indicator

    Issued US 7,590,731

    A mechanism for seeking access of a client to a first server is described. The mechanism involves determining that a client seeking access to the first server is not authenticated by an authentication server. The mechanism further involves communicating a request for login information to be returned to the second server from the client. Login information is received at the authentication server from the client. The client is authenticated by comparing the login information with authentication…

    A mechanism for seeking access of a client to a first server is described. The mechanism involves determining that a client seeking access to the first server is not authenticated by an authentication server. The mechanism further involves communicating a request for login information to be returned to the second server from the client. Login information is received at the authentication server from the client. The client is authenticated by comparing the login information with authentication information maintained by the authentication server. When the login information matches the authentication information, a user authentication indicator is generated at the authentication server and the user sends the authentication indicator to the first server.

    See patent
  • Session key security protocol

    Issued US 7,971,240

    Exchanging information in a multi-site authentication system. A network server receives, from an authentication server, a request by a client computing device for a service provided by the network server along with an authentication ticket. The authentication ticket includes: a session key encrypted by a public key associated with the network server, message content encrypted by the session key, and a signature for the encrypted session key and the encrypted message content. The signature…

    Exchanging information in a multi-site authentication system. A network server receives, from an authentication server, a request by a client computing device for a service provided by the network server along with an authentication ticket. The authentication ticket includes: a session key encrypted by a public key associated with the network server, message content encrypted by the session key, and a signature for the encrypted session key and the encrypted message content. The signature includes address information of the network server. The network server identifies its own address information in the signature to validate the signature included in the authentication ticket and verifies the authentication ticket content based on the signature included in the authentication ticket. The network server decrypts the encrypted session key via a private key associated with the second network server and decrypts the encrypted message content via the decrypted session key.

    See patent
  • Transparent authentication using an authentication server

    Issued US 7,421,731

    A user, by way of a computing device, requests and receives content from a first server at the computing device. An authentication response is also received from the first server at the computing device of the user. The authentication response includes an address of the second server and an executable script. The computing device of the user executes the executable script by issuing a request to the second server for state information corresponding to the user, receiving the state information…

    A user, by way of a computing device, requests and receives content from a first server at the computing device. An authentication response is also received from the first server at the computing device of the user. The authentication response includes an address of the second server and an executable script. The computing device of the user executes the executable script by issuing a request to the second server for state information corresponding to the user, receiving the state information from the second server; and determining, based on the state information, whether the user is authenticated to the second server. If the user is not authenticated to the second server, the computer device of the user displays a login module that is visually associated with the first server. Such login module collects login information for authenticating the user to the second server. If the user is authenticated in the second server, the computing device of the user issues a request to the second server for vouching information for authenticating the user to the first server.

    Other inventors
    See patent
  • Authentication broker service

    Issued US US7607008 B2

    A user is authenticated for a relying computing entity (e.g., an enterprise) through an authentication broker service, wherein a trust relationship exists between the relying computing entity and the authentication broker service. The authentication broker service has a trust relationship with the relying computing entity and the authentication service that issued the identity of the user. The relying computing entity asks the authentication broker service to authenticate the identity of the…

    A user is authenticated for a relying computing entity (e.g., an enterprise) through an authentication broker service, wherein a trust relationship exists between the relying computing entity and the authentication broker service. The authentication broker service has a trust relationship with the relying computing entity and the authentication service that issued the identity of the user. The relying computing entity asks the authentication broker service to authenticate the identity of the user. The authentication broker service captures the user's credential (or directs the authentication service to do so) and sends an authentication response (e.g., a token) to the relying computing entity in order to authenticate the identity of the user to the relying computing entity. The relying computing entity verifies the authentication response based on the trust relationship between the relying computing entity and the authentication broker service.

    Other inventors
    See patent
  • Controlling access to a network server using an authentication ticket

    Issued US 6,678,731

    A system determines whether to grant a user access to a network server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user is authenticated by the authentication server, then the network server is notified that the user is authenticated through the use of an…

    A system determines whether to grant a user access to a network server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user is authenticated by the authentication server, then the network server is notified that the user is authenticated through the use of an authentication ticket, and the network server grants the network server user access. If the user is not authenticated by the authentication server, then login information is retrieved from the user and compared to authentication information maintained by the authentication server. If the retrieved login information matches the authentication information, then the network server is notified that the user is authenticated by using the authentication ticket.

    Other inventors
    See patent
  • Authenticating user access to a network server without communicating user authentication cookie to the network server

    Issued US 7,016,960

    A system determines whether to grants access to a network server by a user. Initially, a user attempts to gain access to a network server, such as a web server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user was already authenticated by the authentication server, then…

    A system determines whether to grants access to a network server by a user. Initially, a user attempts to gain access to a network server, such as a web server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user was already authenticated by the authentication server, then the network server is notified that the user is authenticated. The network server then grants the user access to the network server. If the user was not already authenticated by the authentication server, then login information is retrieved from the user and compared to authentication information maintained by the authentication server. If the retrieved login information matches the authentication information, then the network server is notified that the user is authenticated. The retrieved login information and the authentication information is concealed from the network server. If the user is authenticated, then a user profile is communicated to the network server along with the notification that the user is authenticated. If the user is successfully authenticated, then a cookie is provided to an Internet browser operated by the user. The cookie contains information regarding user authentication, the user's profile, and a list of network servers previously visited by the user.

    Other inventors
    See patent
  • Authenticating access to a network server without communicating login information through the network server

    Issued US 6,584,505

    A system determines whether to grants access to a network server by a user. Initially, a user attempts to gain access to a network server, such as a web server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user was already authenticated by the authentication server, then…

    A system determines whether to grants access to a network server by a user. Initially, a user attempts to gain access to a network server, such as a web server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user was already authenticated by the authentication server, then the network server is notified that the user is authenticated. The network server then grants the user access to the network server. If the user was not already authenticated by the authentication server, then login information is retrieved from the user and compared to authentication information maintained by the authentication server. If the retrieved login information matches the authentication information, then the network server is notified that the user is authenticated. The retrieved login information and the authentication information is concealed from the network server. If the user is authenticated, then a user profile is communicated to the network server along with the notification that the user is authenticated. If the user is successfully authenticated, then a cookie is provided to an Internet browser operated by the user. The cookie contains information regarding user authentication, the user's profile, and a list of network servers previously visited by the user.

    Other inventors
    See patent
  • Moving a messaging system mailbox

    Issued US 5,915,004

    A messaging system user's mailbox is moved using a method in which the mailbox is flagged as being moved and a message arriving for the user during the move is delivered to a holding area to await re-delivery to the mailbox after the move is completed. A combination of non-volatile memory and volatile memory is used to ensure the message's delivery in the event of a power loss or other system failure.

    Other inventors
    • Max Benson
    See patent

Languages

  • French

    -

More activity by Hal

View Hal’s full profile

  • See who you know in common
  • Get introduced
  • Contact Hal directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Hal Howard in United States

Add new skills with these courses