About
- Designed and lead the development of 6 products from the ground up, three of them earn…
Articles by Hal
Activity
-
Howdy folks - Sharing the news today that after 34 years, I've retired from Microsoft. It's hard to capture three decades in a single post, but what…
Howdy folks - Sharing the news today that after 34 years, I've retired from Microsoft. It's hard to capture three decades in a single post, but what…
Liked by Hal Howard
-
Friends, I have some big news - I have decided to move back to England and leave Microsoft ❤️ When I first landed in Seattle, I had no idea where…
Friends, I have some big news - I have decided to move back to England and leave Microsoft ❤️ When I first landed in Seattle, I had no idea where…
Liked by Hal Howard
-
The last few weeks have really highlighted how much the right people matter. I’ve spent time connecting with colleagues, working on a couple of side…
The last few weeks have really highlighted how much the right people matter. I’ve spent time connecting with colleagues, working on a couple of side…
Liked by Hal Howard
Experience
Education
Patents
-
DASHBOARD WITH PANORAMIC DISPLAY OF ORDERED CONTENT
Issued US
See patentA role-based dashboard display is generated, showing a plurality of different display sections that display information from a computer system. The display sections include a customer-branded section, a favorites section, a workspace display section and a live data feed section. The sections have display elements linked to underlying data.
-
DASHBOARD WITH SELECTABLE WORKSPACE REPRESENTATIONS
Issued US
See patentA role-based dashboard display is generated, showing a plurality of different display sections that display information from a computer system. A workspace display section includes a plurality of different workspace display elements, each showing information specific to a different workspace corresponding to a user's role. A selection user input mechanism receives user actuation to change a visual representation of the different workspace display items.
-
User support experience with automated generated virtual environment in public cloud infrastructure
Issued US
-
Accessing a server using a user authentication indicator
Issued US 7,590,731
See patentA mechanism for seeking access of a client to a first server is described. The mechanism involves determining that a client seeking access to the first server is not authenticated by an authentication server. The mechanism further involves communicating a request for login information to be returned to the second server from the client. Login information is received at the authentication server from the client. The client is authenticated by comparing the login information with authentication…
A mechanism for seeking access of a client to a first server is described. The mechanism involves determining that a client seeking access to the first server is not authenticated by an authentication server. The mechanism further involves communicating a request for login information to be returned to the second server from the client. Login information is received at the authentication server from the client. The client is authenticated by comparing the login information with authentication information maintained by the authentication server. When the login information matches the authentication information, a user authentication indicator is generated at the authentication server and the user sends the authentication indicator to the first server.
-
Session key security protocol
Issued US 7,971,240
See patentExchanging information in a multi-site authentication system. A network server receives, from an authentication server, a request by a client computing device for a service provided by the network server along with an authentication ticket. The authentication ticket includes: a session key encrypted by a public key associated with the network server, message content encrypted by the session key, and a signature for the encrypted session key and the encrypted message content. The signature…
Exchanging information in a multi-site authentication system. A network server receives, from an authentication server, a request by a client computing device for a service provided by the network server along with an authentication ticket. The authentication ticket includes: a session key encrypted by a public key associated with the network server, message content encrypted by the session key, and a signature for the encrypted session key and the encrypted message content. The signature includes address information of the network server. The network server identifies its own address information in the signature to validate the signature included in the authentication ticket and verifies the authentication ticket content based on the signature included in the authentication ticket. The network server decrypts the encrypted session key via a private key associated with the second network server and decrypts the encrypted message content via the decrypted session key.
-
Transparent authentication using an authentication server
Issued US 7,421,731
A user, by way of a computing device, requests and receives content from a first server at the computing device. An authentication response is also received from the first server at the computing device of the user. The authentication response includes an address of the second server and an executable script. The computing device of the user executes the executable script by issuing a request to the second server for state information corresponding to the user, receiving the state information…
A user, by way of a computing device, requests and receives content from a first server at the computing device. An authentication response is also received from the first server at the computing device of the user. The authentication response includes an address of the second server and an executable script. The computing device of the user executes the executable script by issuing a request to the second server for state information corresponding to the user, receiving the state information from the second server; and determining, based on the state information, whether the user is authenticated to the second server. If the user is not authenticated to the second server, the computer device of the user displays a login module that is visually associated with the first server. Such login module collects login information for authenticating the user to the second server. If the user is authenticated in the second server, the computing device of the user issues a request to the second server for vouching information for authenticating the user to the first server.
Other inventorsSee patent -
Authentication broker service
Issued US US7607008 B2
A user is authenticated for a relying computing entity (e.g., an enterprise) through an authentication broker service, wherein a trust relationship exists between the relying computing entity and the authentication broker service. The authentication broker service has a trust relationship with the relying computing entity and the authentication service that issued the identity of the user. The relying computing entity asks the authentication broker service to authenticate the identity of the…
A user is authenticated for a relying computing entity (e.g., an enterprise) through an authentication broker service, wherein a trust relationship exists between the relying computing entity and the authentication broker service. The authentication broker service has a trust relationship with the relying computing entity and the authentication service that issued the identity of the user. The relying computing entity asks the authentication broker service to authenticate the identity of the user. The authentication broker service captures the user's credential (or directs the authentication service to do so) and sends an authentication response (e.g., a token) to the relying computing entity in order to authenticate the identity of the user to the relying computing entity. The relying computing entity verifies the authentication response based on the trust relationship between the relying computing entity and the authentication broker service.
Other inventorsSee patent -
Controlling access to a network server using an authentication ticket
Issued US 6,678,731
A system determines whether to grant a user access to a network server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user is authenticated by the authentication server, then the network server is notified that the user is authenticated through the use of an…
A system determines whether to grant a user access to a network server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user is authenticated by the authentication server, then the network server is notified that the user is authenticated through the use of an authentication ticket, and the network server grants the network server user access. If the user is not authenticated by the authentication server, then login information is retrieved from the user and compared to authentication information maintained by the authentication server. If the retrieved login information matches the authentication information, then the network server is notified that the user is authenticated by using the authentication ticket.
Other inventorsSee patent -
Authenticating user access to a network server without communicating user authentication cookie to the network server
Issued US 7,016,960
A system determines whether to grants access to a network server by a user. Initially, a user attempts to gain access to a network server, such as a web server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user was already authenticated by the authentication server, then…
A system determines whether to grants access to a network server by a user. Initially, a user attempts to gain access to a network server, such as a web server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user was already authenticated by the authentication server, then the network server is notified that the user is authenticated. The network server then grants the user access to the network server. If the user was not already authenticated by the authentication server, then login information is retrieved from the user and compared to authentication information maintained by the authentication server. If the retrieved login information matches the authentication information, then the network server is notified that the user is authenticated. The retrieved login information and the authentication information is concealed from the network server. If the user is authenticated, then a user profile is communicated to the network server along with the notification that the user is authenticated. If the user is successfully authenticated, then a cookie is provided to an Internet browser operated by the user. The cookie contains information regarding user authentication, the user's profile, and a list of network servers previously visited by the user.
Other inventorsSee patent -
Authenticating access to a network server without communicating login information through the network server
Issued US 6,584,505
A system determines whether to grants access to a network server by a user. Initially, a user attempts to gain access to a network server, such as a web server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user was already authenticated by the authentication server, then…
A system determines whether to grants access to a network server by a user. Initially, a user attempts to gain access to a network server, such as a web server. Prior to granting access to the network server, the network server authenticates the user by sending an authentication request to an authentication server. The authentication server determines whether the user was already authenticated by the authentication server. If the user was already authenticated by the authentication server, then the network server is notified that the user is authenticated. The network server then grants the user access to the network server. If the user was not already authenticated by the authentication server, then login information is retrieved from the user and compared to authentication information maintained by the authentication server. If the retrieved login information matches the authentication information, then the network server is notified that the user is authenticated. The retrieved login information and the authentication information is concealed from the network server. If the user is authenticated, then a user profile is communicated to the network server along with the notification that the user is authenticated. If the user is successfully authenticated, then a cookie is provided to an Internet browser operated by the user. The cookie contains information regarding user authentication, the user's profile, and a list of network servers previously visited by the user.
Other inventorsSee patent -
Moving a messaging system mailbox
Issued US 5,915,004
A messaging system user's mailbox is moved using a method in which the mailbox is flagged as being moved and a message arriving for the user during the move is delivered to a holding area to await re-delivery to the mailbox after the move is completed. A combination of non-volatile memory and volatile memory is used to ensure the message's delivery in the event of a power loss or other system failure.
Other inventors -
Languages
-
French
-
More activity by Hal
-
Grateful. Thank you. Farewell, Microsoft. After 7313 days (13 is my lucky number!), I’m closing an unforgettable chapter. Microsoft shaped me in…
Grateful. Thank you. Farewell, Microsoft. After 7313 days (13 is my lucky number!), I’m closing an unforgettable chapter. Microsoft shaped me in…
Liked by Hal Howard
-
The enterprise of the future won’t be built by a single vendor. It will be powered by an open ecosystem, with Process Intelligence as the connective…
The enterprise of the future won’t be built by a single vendor. It will be powered by an open ecosystem, with Process Intelligence as the connective…
Liked by Hal Howard
-
Excited to be part of London Mining Week! 🌎 Check out what’s happening: https://lnkd.in/gcqcaav3 For five days, the global mining industry takes…
Excited to be part of London Mining Week! 🌎 Check out what’s happening: https://lnkd.in/gcqcaav3 For five days, the global mining industry takes…
Liked by Hal Howard
-
After 25 incredible years at Microsoft, it’s time for my next chapter. I’m proud of what our teams built, launching and scaling products that…
After 25 incredible years at Microsoft, it’s time for my next chapter. I’m proud of what our teams built, launching and scaling products that…
Liked by Hal Howard
-
30 years ago, I was just a few weeks into my first Development Manager role as the first dev hire for Cityscape, what would become sidewalk.com…
30 years ago, I was just a few weeks into my first Development Manager role as the first dev hire for Cityscape, what would become sidewalk.com…
Liked by Hal Howard
-
This week on Shaken, Stirred & Synced: E002 - Blood and Sand - Measuring AI, legal battles and AI induced psychosis 🍸 This week’s cocktail - Blood…
This week on Shaken, Stirred & Synced: E002 - Blood and Sand - Measuring AI, legal battles and AI induced psychosis 🍸 This week’s cocktail - Blood…
Liked by Hal Howard
-
What an incredible honor! I was humbled to receive this "award" from more than 40 Business Central MVPs in Tivoli, Copenhagen Monday evening. It…
What an incredible honor! I was humbled to receive this "award" from more than 40 Business Central MVPs in Tivoli, Copenhagen Monday evening. It…
Liked by Hal Howard
-
I’m pleased to share that Matthew Haisten has joined Domain 6 as a Consulting Director. Matthew’s creativity and versatility, shaped by a career of…
I’m pleased to share that Matthew Haisten has joined Domain 6 as a Consulting Director. Matthew’s creativity and versatility, shaped by a career of…
Liked by Hal Howard
-
Excited for a summer filled with AI conferences as I delve into research for my upcoming book. Thrilled to announce my track session at #AICONUSA…
Excited for a summer filled with AI conferences as I delve into research for my upcoming book. Thrilled to announce my track session at #AICONUSA…
Liked by Hal Howard
-
After 25+ years at Microsoft, I’m entering a new chapter. I too was impacted by the recent changes. This transition wasn’t something I planned—but…
After 25+ years at Microsoft, I’m entering a new chapter. I too was impacted by the recent changes. This transition wasn’t something I planned—but…
Liked by Hal Howard
-
After 25 incredible years at Microsoft, I had the rare privilege of joining Ford to help lead its digital transformation — rebuilding Cloud Platform,…
After 25 incredible years at Microsoft, I had the rare privilege of joining Ford to help lead its digital transformation — rebuilding Cloud Platform,…
Liked by Hal Howard
-
Big news, friends! As someone who has been in the Microsoft ecosystem for most of my career, I have been blessed to meet amazing friends, work with…
Big news, friends! As someone who has been in the Microsoft ecosystem for most of my career, I have been blessed to meet amazing friends, work with…
Liked by Hal Howard
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content