new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)





Similar
Filing Names

Novell Inc
Novell Inc A Delaware Corporation
Novell Inc_20100128
Novell Inc_20100114
  

Novell Inc patents

Recent patent applications related to Novell Inc. Novell Inc is listed as an Agent/Assignee. Note: Novell Inc may have other listings under different names/spellings. We're not affiliated with Novell Inc, we're just tracking patents.

ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "N" | Novell Inc-related inventors




Date Novell Inc patents (updated weekly) - BOOKMARK this page
03/02/17Generating and merging keys for grouping and differentiating volumes of files
01/05/17Mechanisms to secure data on hard reset of device
12/01/16Techniques for sharing virtual machine (vm) resources
12/01/16Techniques for establishing a trusted cloud service
12/01/16Identity and policy enforced inter-cloud and intra-cloud channel
09/22/16System and upgrading kernels in cloud computing environments
09/08/16Techniques for identity-enabled interface deployment
08/18/16File mapping and converting for dynamic disk personalization for multiple platforms
06/16/16Techniques for prevent information disclosure via dynamic secure cloud resources
05/12/16Techniques for secure data management in a distributed environment
01/21/16Runtime patching of an operating system (os) without stopping execution
10/22/15Meta-directory control and evaluation of events
10/01/15Personal authentication and access
10/01/15Time-based one time password (totp) for network authentication
10/01/15Techniques for virtual representational state transfer (rest) interfaces
07/30/15Proximity-based authentication
07/30/15Audio proximity-based mobile device data sharing
07/23/15Techniques for cloud control and management
07/16/15Techniques for secure access management in virtual environments
06/25/15Runtime patching of an operating system (os) without stopping execution
06/04/15Techniques for authentication via a mobile device
05/28/15Client-based authentication
05/21/15Techniques for identity and policy based routing
04/30/15Techniques for establishing a file system that exposes a virtual file system for backup operations
04/30/15Techniques for workload toxic mapping
04/30/15Techniques for secure message offloading
02/26/15Stopping functions for grouping and differentiating files based on content
02/19/15System and determining effective policy profiles in a client-server architecture
12/25/14Techniques for dynamic disk personalization
12/25/14Techniques for workload spawning
10/16/14System and modeling interpendencies in a network datacenter
09/18/14Analytic injection
09/18/14Remote enabling of storage
09/18/14Extending functionality of legacy services in computing system environment
08/28/14Structured relevance-a mechanism to reveal how data is related
08/21/14User input auto-completion
08/21/14Cluster-free techniques for enabling a directory protocol-based domain name system (dns) service for high availability
08/21/14System and intelligent workload management
07/10/14Techniques for privileged network routing
07/10/14Techniques for instantiating and configuring projects
07/03/14Techniques for secure debugging and monitoring
06/12/14Techniques for auditing and controlling network services
06/12/14Secure virtual machine memory
06/05/14Techniques for help desk management
05/22/14System and determining fuzzy cause and effect relationships in an intelligent workload management system
05/22/14Techniques for evaluating and managing cloud networks
05/22/14Mechanisms to secure data on hard reset of device
05/08/14Mechanisms to persist hierarchical object relations
05/01/14Techniques for device independent session migration
05/01/14Techniques for desktop migration
03/06/14Techniques for mapping and managing resources
03/06/14Federated timeout
01/30/14Techniques for distributed testing
01/30/14Techniques for workload coordination
01/16/14Techniques for secure data management in a distributed environment
01/16/14Techniques for dynamic disk personalization
11/28/13System and upgrading kernels in cloud computing environments
11/07/13System and efficiently building virtual appliances in a hosted environment
10/24/13System and providing virtual desktop extensions on a client desktop
10/03/13Techniques for identity and policy based routing
09/26/13System and providing annotated service blueprints in an intelligent workload management system
09/05/13Meta-directory control and evaluation of events
09/05/13Techniques for generically accessing data
06/06/13Techniques to automatically classify processes
04/11/13System and structuring self-provisioning workloads deployed in virtualized data centers
Patent Packs
03/21/13Techniques for instantiating and configuring projects
03/07/13Techniques for gauging performance of services
11/29/12Integrated media browse and insertion
08/30/12Social networking content management
08/23/12Structured relevance - a mechanism to reveal how data is related
08/23/12Structured relevance - a mechanism to reveal why data is related
05/31/12System and automatic provisioning of onsite networking services
05/24/12System and determining fuzzy cause and effect relationships in an intelligent workload management system
03/29/12Information card overlay
03/15/12System and providing load balancer visibility in an intelligent workload management system
03/01/12System and structuring self-provisioning workloads deployed in virtualized data centers
12/08/11System and managing changes in a network datacenter
12/08/11System and modeling interdependencies in a network datacenter
12/08/11System and detecting real-time security threats in a network datacenter
11/10/11Mechanisms to persist hierarchical object relations
Patent Packs
11/10/11Techniques for extending and controlling access to a common information model (cim)
11/03/11System and upgrading kernels in cloud computing environments
08/25/11Managing digital identity information
08/25/11System and providing virtual desktop extensions on a client desktop
08/04/11Session sensitive data backups and restores
08/04/11Techniques for versioning file systems
08/04/11Techniques for extending and controlling access to a common information model (cim)
08/04/11Method and presenting, searching, and viewing directories
07/14/11Computer-implemented security event transport using a message bus
07/07/11Techniques for secure transparent switching between modes of a virtual private network (vpn)
06/23/11Performing a business transaction without disclosing sensitive identity information to a relying party
05/26/11System and intelligent workload management
05/26/11System and managing information technology models in an intelligent workload management system
05/26/11System and recording collaborative information technology processes in an intelligent workload management system
05/26/11System and controlling cloud and virtualized data centers in an intelligent workload management system
05/26/11System and providing annotated service blueprints in an intelligent workload management system
05/26/11System and discovery enrichment in an intelligent workload management system
05/26/11System and providing scorecards to visualize services in an intelligent workload management system
05/19/11System and implementing a virtual automated teller machine
05/05/11System and implementing a cloud workflow
05/05/11System and implementing cloud mitigation and operations controllers
05/05/11System and implementing a cloud computer
05/05/11System and transparent access and management of user accessible cloud assets
05/05/11System and implementing a secure web application entitlement service
04/21/11Techniques for securing content in an untrusted environment
03/31/11Endpoint security threat mitigation with virtual machine imaging
02/24/11Method for coordinating relationships between multiple physical entities
02/24/11System and implementing an intelligent backup technique for cluster resources
02/17/11System and implementing a proxy authentication server to provide authentication for resources not located behind the proxy authentication server
02/03/11System and implementing a reliable persistent random access compressed data stream
Social Network Patent Pack
02/03/11System and floating index navigation
01/13/11Contextual phone number validation
01/13/11Collaboration swarming
01/13/11Unified addressing, sending, and receiving collaboration service
01/13/11Auto generated and inferred group chat presence
01/13/11Unified editable inbox
01/13/11Presence-enabled inbox
01/13/11Intelligent co-browsing and co-editing
12/30/10System and implementing a dead man dependency technique for cluster resources
12/23/10Remote authorization for operations
Patent Packs
12/09/10System and implementing a cluster token registry for business continuity
11/18/10Syslog message routing systems and methods
10/21/10System and determining effective policy profiles in a client-server architecture
10/21/10System and cross-authoritative configuration management
10/14/10Data backup for virtual machines
09/30/10Coordinated peer-to-peer (p2p) replicated backup and versioning
09/30/10Intellectual property discovery and mapping systems and methods
09/30/10Workstation virus lockdown in a distributed environment
09/30/10User-authorized information card delegation
09/23/10Key distribution
09/23/10System and performing software due diligence using a binary scan engine and parallel pattern matching
09/23/10System and performing code provenance review in a software due diligence system
09/16/10System and unified cloud management
09/16/10Securing a network connection by way of an endpoint computing device
09/16/10System and reducing cloud ip address utilization using a distributor registry
09/16/10System and reduced cloud ip address utilization
09/16/10System and providing key-encrypted storage in a cloud computing environment
09/16/10System and queuing to a cloud via a queuing proxy
09/16/10System and transparent cloud access
09/02/10Key distribution
08/19/10Key distribution
08/12/10Crowd optimization of ambient conditions
08/12/10Optimal memory allocation for guested virtual machine(s)
08/05/10System and auditing governance, risk, and compliance using a pluggable correlation architecture
08/05/10File system in a computing environment
08/05/10System and policy-based registration of client devices
07/29/10Multiple persona information cards
07/29/10System and searching for classifying user activity performed on a computer system
07/29/10System and imaging a memory module while in functional operation
07/15/10Information card overlay
Patent Packs
07/01/10Content analysis and correlation
07/01/10Attribution analysis and correlation
07/01/10Identity analysis and correlation
06/17/10Pre-boot securing of operating system (os) for endpoint evaluation
05/27/10System and implementing a wireless query and display interface
05/27/10Techniques for caching images
05/13/10Predictive service systems
05/06/10Dynamic and automatic colocation and combining of service providers and service clients in a grid of resources
04/29/10System and monitoring reputation changes
04/29/10Protecting computing assets with virtualization
04/22/10Smart card based encryption key and password generation and management
04/22/10In-the-flow security services for guested virtual machines
04/15/10Managing complex dependencies in a file-based team environment
04/15/10Trusted relying party proxy for information card tokens
04/08/10User interface (ui) control for attestation process
04/01/10Flash memory device for booting a computing device including embedded general purpose operating system
04/01/10Managing diverse hardware using common tools
04/01/10Multi-epoch saving and exporting file system events
03/11/10Anonymous shopping transactions on a network through information broker services
03/04/10Scal-free management networks
Social Network Patent Pack
03/04/10Virtual machine file system and incremental snapshot using image deltas
03/04/10System and virtual information cards
02/18/10System and dynamically enabling an application for business continuity
02/18/10System and facilitating user authentication of web page content
02/04/10Adaptive encoding digital images for the internet
02/04/10Backup without overhead of installed backup agent
02/04/10Restoration of a remotely located server
02/04/10Site-specific credential generation using information cards
01/28/10System and method to extend a file manager user interface
01/14/10System and device mapping based on images and reference points
01/14/10Non-interactive information card token generation
12/31/09Copying workload files to a virtual disk
12/31/09Remotable information cards
12/24/09System and offline updation of software in virtual machine (vm) images
12/03/09System and efficiently building virtual appliances in a hosted environment
12/03/09System and inspecting a virtual appliance runtime environment
12/03/09System and managing a virtual appliance lifecycle
12/03/09System and an adaptive wizard utility for graphical user interfaces
12/03/09System and building virtual appliances using a repository metadata server and a dependency resolution service
12/03/09System and supporting a virtual appliance
Social Network Patent Pack
11/19/09System and performing designated service image processing functions in a service image warehouse
11/12/09System and displaying multiple time zones in an online calendar view
10/22/09System and correlating events in a pluggable correlation architecture
10/15/09System and implementing a virtual automated teller machine
10/01/09Claim category handling
09/24/09Cardspace history validator
09/17/09Predictive service systems using emotion detection
09/10/09System and using workflows with information cards
08/27/09System and secure account reset utilizing information cards
08/13/09Privately sharing relying party reputation with information card selectors
08/13/09Visual and non-visual cues for conveying state of information cards, electronic wallets, and keyrings
08/13/09System and application-integrated information card selection
08/13/09Info card selector reception of identity provider based data pertaining to info cards
08/06/09Methods for setting and changing the user credential in information cards
07/30/09Parallelizing multiple boot images with virtual machines
07/30/09System and providing reputation reciprocity with anonymous identities
07/09/09Level of service descriptors
06/18/09System and creating platform-specific self-extracting client packages using a production server
05/14/09Secure launching of browser from privileged process
05/07/09Method and splitting a replicated volume
04/16/09System and tracking software changes
04/09/09System and representing agreements as reputation
04/09/09Provisioning users to multiple agencies
03/19/09Information card federation point tracking and management
03/19/09Virtual machine image builder for automated installation of fully-virtualized operating system
03/19/09Information card federation point tracking and management
03/19/09Setting and synching preferred credentials in a disparate credential store environment
03/19/09Processing html extensions to enable support of information cards by a relying party
03/12/09Method for efficient thread usage for hierarchically structured tasks
03/05/09Searching and replacing credentials in a disparate credential store environment
Social Network Patent Pack
02/19/09Coordinating credentials across disparate credential stores
02/05/09Network content in dictionary-based (de)compression
02/05/09System and indicating usage of system resources using taskbar graphics
02/05/09System and ordered credential selection
01/28/10System and method to extend a file manager user interface
01/14/10Non-interactive information card token generation
11/05/09Dynamic information card rendering
10/29/09Restricted use information cards







ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Novell Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Novell Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###




';