Brian Hamilton Jarvis
Burglar Alarm in Orem, UT

License number
Utah 6498024-8009
Issued Date
Feb 20, 2007
Expiration Date
Aug 20, 2007
Category
Burglar Alarm
Type
Temporary Burglar Alarm Company Agent
Address
Address
Orem, UT

Personal information

See more information about Brian Hamilton Jarvis at radaris.com
Name
Address
Phone
Brian Jarvis, age 70
5233 S Queenswood Dr, Salt Lake City, UT 84129
(801) 836-2765
Brian Jarvis, age 54
5810 Topowa Dr, Salt Lake City, UT 84107
(801) 263-8094
Brian Jarvis, age 38
323 E Center St, Smithfield, UT 84335
(435) 563-6219
Brian Jarvis, age 63
934 E 880 N, Orem, UT 84097
Brian Jarvis, age 38
160 E 400 N, Smithfield, UT 84335
(435) 563-9051

Professional information

See more information about Brian Hamilton Jarvis at trustoria.com
Brian Jarvis Photo 1
Network Traffic Manager Server For Providing Policy-Based Recommendations To Clients

Network Traffic Manager Server For Providing Policy-Based Recommendations To Clients

US Patent:
5870561, Feb 9, 1999
Filed:
Mar 15, 1996
Appl. No.:
8/619814
Inventors:
Brian Lee Jarvis - Orem UT
Jeffrey T. Hawkins - Mapleton UT
Assignee:
Novell, Inc. - Orem UT
International Classification:
G06F 1300, G06F 1516, G06F 300
US Classification:
39520068
Abstract:
A policy-driven network traffic manager recommends to individual application programs that generate network traffic whether, and optionally under what conditions, they should generate network traffic. The network traffic manager has an interface, through which the application programs, prior to generating network traffic, call the network traffic manager and describe the traffic the application programs propose to generate. A policy repository stores a set of policies, which the network traffic manager uses to ascertain whether the application programs should generate the proposed network traffic. The policies can include considerations such as time, link cost, latency, congestion and availability. The network traffic manager then sends the recommendations to the application programs.


Brian Jarvis Photo 2
Method Of Implementing A Forward Compatibility Network Directory Syntax

Method Of Implementing A Forward Compatibility Network Directory Syntax

US Patent:
6424976, Jul 23, 2002
Filed:
Mar 23, 2000
Appl. No.:
09/533442
Inventors:
Brian Jarvis - Orem UT
Layne Izatt - Orem UT
Mark Hinckley - Lincoln UT
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 1730
US Classification:
707201
Abstract:
System and method for implementing a forward compatibility syntax in a directory services environment is described. In one embodiment, data comprising an attribute according to a new syntax that is supported by newer servers, but not by older servers, is separated into data with respect to which referential integrity is not a concern (hereinafter “blob data”) and data with respect to which referential integrity is a concern (hereinafter Distinguished Names (“DNs”)). The two types of data are then combined according to a forward compatibility (“FC”) syntax that is supported by both older and newer servers. Only certain, newer, servers understand and convert between the FC syntax and the actual new syntax; older servers are capable of supporting the FC syntax without needing to understand it.


Brian Jarvis Photo 3
Access Control With Delayed Binding Of Object Identifiers

Access Control With Delayed Binding Of Object Identifiers

US Patent:
6308181, Oct 23, 2001
Filed:
Dec 19, 1998
Appl. No.:
9/216254
Inventors:
Brian L Jarvis - Orem UT
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 1730
US Classification:
707102
Abstract:
Methods, signals, devices, and systems are provided for controlling access to objects and their attributes in a database. The database may be hierarchical, or it may have positional relationships based on a graph structure. In a hierarchical database possible positional relationships include "child", "parent", "grandchild", and so on. A trustee field in an access control property of a target object is furnished with the positional relationship. A positional relationship is evaluated when an access request is made, and the binding of trustee object identifiers with particular targets through access control properties is thereby delayed until such binding is necessary to determine if the access request should be granted. The delayed binding may be combined with inheritance, with conventional access control lists, and with other familiar tools and techniques to enhance access control in the database of objects.


Brian Jarvis Photo 4
Method And Apparatus For Proxy Authentication

Method And Apparatus For Proxy Authentication

US Patent:
5913025, Jun 15, 1999
Filed:
Nov 14, 1996
Appl. No.:
8/748889
Inventors:
DeeAnne Barker Higley - Provo UT
Bruce Warner Thorne - Salem UT
Brian Lee Jarvis - Orem UT
Assignee:
Novell, Inc. - Orem UT
International Classification:
G06F 1100
US Classification:
39518701
Abstract:
A method for a source to obtain the rights of a target object is disclosed. The source first obtains the rights of a source object, which rights include authorization to access a target object and to modify authentication data of the target object. Next, the source object generates new authentication data. After accessing the target object using the rights of the source object, the source modifies the authentication data of the target object to include the new authentication data. Using the new authentication data, the source obtains the rights of the target object, whereby the source becomes a proxy for the target object. As a proxy, the source uses the rights of the target object. Alternative processes for proxy authentication, as well as apparatus for proxy authentication, are also disclosed.


Brian Jarvis Photo 5
Method And Apparatus For Directed Data Propagation

Method And Apparatus For Directed Data Propagation

US Patent:
6047289, Apr 4, 2000
Filed:
Nov 7, 1997
Appl. No.:
8/965803
Inventors:
Bruce Warner Thorne - Salem UT
Brian Lee Jarvis - Orem UT
Assignee:
Novell, Inc. - Orem UT
International Classification:
G06F 1730
US Classification:
707 10
Abstract:
A computer system comprises a management service having a plurality of objects. Each of the objects has at least one associated attribute with associated values. A master object in the management service includes a source attribute with associated data. One or more slave objects in the management service correspond to the master object and are distinct from the master object. Each of these slave objects has a destination attribute which corresponds to the source attribute of the master object. A propagation agent is capable of accessing the slave objects and transmitting the data associated with the source attribute to the destination attributes of the slave objects.