1
Rosario Gennaro, Donald Byron Johnson, Paul Ashley Karger, Stephen Michael Matyas Jr, Mohammad Peyravian, David Robert Safford, Marcel Mordechay Yung, Nevenko Zunic: Two-phase cryptographic key recovery system. International Business Machines Corporation, William A Kinnaman Jr, August 10, 1999: US05937066 (238 worldwide citation)

A cryptographic key recovery system that operates in two phases. In the first phase, the sender establishes a secret value with the receiver. For each key recovery agent, the sender generates a key-generating value as a one-way function of the secret value and encrypts the key-generating value with ...


2

3
Jeffrey P Kubala: Method and apparatus for providing a server function in a logically partitioned hardware machine. International Business Machines Corporation, William A Kinnaman Jr, October 8, 1996: US05564040 (191 worldwide citation)

A server function is provided in a hardware machine which is divided into a plurality of logical partitions, each of which functions as a virtual hardware machine. The hardware machine has a non-user-accessible storage device for storing machine control code and other non-user-accessible code and, o ...


4
David Andrew Glowny: System and method for remote software configuration and distribution. International Business Machines Corporation, Lily Neff, Mark S Walker, William A Kinnaman Jr, September 8, 1998: US05805897 (177 worldwide citation)

A system and method for remote software installation and maintenance. A number of workstations are connected by a network. Each has basic peer-to-peer communication ability providing remote file transfer and remote command execution. An arbitrarily selected workstation captures user installation req ...


5
Richard H Guski, Raymond C Larson, Stephen M Matyas Jr, Donald B Johnson, Don Coppersmith: Authentication system using one-time passwords. International Business Machines Corporation, William A Kinnaman Jr, January 7, 1997: US05592553 (175 worldwide citation)

A system for authenticating a user located at a requesting node to a resource such as a host application located at an authenticating node using one-time passwords that change pseudorandomly with each request for authentication. At the requesting node a non-time-dependent value is generated from non ...


6
Francis Archibald Brown Douglas, David Andrew Glowny, Colette Anne Mastrangelo, Paul Melvin Mayer, Peter David Shier, Jenngang Shih, Robin Smith: Method and apparatus for establishing communications sessions in a remote resource control environment. International Business Machines Corporation, William A Kinnaman Jr, Lily Neff, July 29, 1997: US05652908 (167 worldwide citation)

A system for providing distributed control of a resource with centralized configuration management. A network of distributed workstations is provided for controlling a resource such as a large mainframe computer. Server workstations for applying control commands to the resource are attached to each ...


7
Jeffrey D Aman, Curt L Cotner, Donna N T Dillenberger, David B Emmes: System of assigning work requests based on classifying into an eligible class where the criteria is goal oriented and capacity information is available. International Business Machines Corporation, William A Kinnaman Jr, Peter L Michaelson & Wallace Michaelson, February 11, 1997: US05603029 (148 worldwide citation)

Apparatus and accompanying methods for use preferably in a multi-system shared data (sysplex) environment (100), wherein each system (110) provides one or more servers (115), for dynamically and adaptively assigning and balancing new work and for new session requests, among the servers in the sysple ...


8
Catherine Krueger Eilert, Peter Bergersen Yocom: System for managing processor resources in a multisystem environment in order to provide smooth real-time data streams while enabling other types of applications to be processed concurrently. International Business Machines Corporation, William A Kinnaman Jr Esq, Heslin & Rothenberg P C, September 7, 1999: US05948065 (146 worldwide citation)

A system within a multisystem environment is selected to run a real-time application. The selection process looks for a system in which the amount of a processor resource for delivering a real-time data stream of the real-time application has the least impact on other work processing on the selected ...


9
Rosario Gennaro, Paul Ashley Karger, Stephen Michael Matyas Jr, Mohammad Peyravian, David Robert Safford, Nevenko Zunic: Method and apparatus for verifiably providing key recovery information in a cryptographic system. International Business Machines Corporation, William A Kinnaman Jr, May 25, 1999: US05907618 (134 worldwide citation)

A method and apparatus for verifiably providing key recovery information to one or more trustees in a cryptographic communication system having a sender and a receiver Each communicating party has its own Diffie-Hellman key pair comprising a secret value and corresponding public value, as does each ...


10
Robert R Berbec, John L Brady, James M Caffrey, Joanne T Crimi, Arthur P Fenaroli, Matthew C Iatridis, Gary S Puchkoff, Roberto J Sanchez, Madeline R Whalen, Joseph A Williams: Dynamic server-managed access control for a distributed file system. International Business Machines Corporation, William A Kinnaman Jr, September 19, 2000: US06122631 (120 worldwide citation)

A method and apparatus for providing dynamically controlling access to files in a client/server system. A client wanting access to a file first requests a token from an object server. The object server generates the token as a function of the file name and ephemeral information and provides the toke ...