1
Bernard J Halter, Alphonse M Bracco, Donald B Johnson, An V Le, Stephen M Matyas, Rostislaw Prymak deceased, James D Randall, John D Wilkins: Method and system for multimedia access control enablement. International Business Machines Corporation, John E Hoel, June 7, 1994: US05319705 (701 worldwide citation)

A method and system are disclosed for securely distributing a plurality of software files from a software distribution processor to a user processor, while selectively enabling the user processor to only use a subset of a lesser plurality of the software files. This is achieved by employing a custom ...


2
Paul C Hershey, Donald B Johnson, An V Le, Stephen M Matyas, John G Waclawsky, John D Wilkins: Network security system and method using a parallel finite state machine adaptive active monitor and responder. International Business Machines Corporation, Joseph C Redmond Jr, John E Hoel, John D Flynn, May 9, 1995: US05414833 (386 worldwide citation)

A system and method provide a security agent, consisting of a monitor and a responder, that respond to a detected security event in a data communications network, by producing and transmitting a security alert message to a network security manager. The alert is a security administration action which ...


3
Stephen M Matyas, Donald B Johnson, An V Le, Rostislaw Prymak, William C Martin, William S Rohland, John D Wilkins: Method to establish and enforce a network cryptographic security policy in a public key cryptosystem. International Business Machines Corporation, John E Hoel, November 17, 1992: US05164988 (194 worldwide citation)

Device A in a public key cryptographic network will be constrained to continue to faithfully practice a security policy dictated by a network certification center, long after device A's public key PUMa has been certified. If device A alters its operations from the limits encoded in its configuration ...


4
Stephen M Matyas, Donald B Johnson, An V Le, Rostislaw Prymak, William C Martin, William S Rohland, John D Wilkins: Cryptographic facility environment backup/restore and replication in a public key cryptosystem. International Business Machines Corporation, John E Hoel, November 23, 1993: US05265164 (176 worldwide citation)

A computer apparatus, program and method function in a data processing system to replicate a cryptographic facility. The system includes a first cryptographic facility containing a portable part which personalizes the first cryptographic facility. The system also includes a second cryptographic faci ...


5
Richard H Guski, Raymond C Larson, Stephen M Matyas Jr, Donald B Johnson, Don Coppersmith: Authentication system using one-time passwords. International Business Machines Corporation, William A Kinnaman Jr, January 7, 1997: US05592553 (169 worldwide citation)

A system for authenticating a user located at a requesting node to a resource such as a host application located at an authenticating node using one-time passwords that change pseudorandomly with each request for authentication. At the requesting node a non-time-dependent value is generated from non ...


6
Dennis G Abraham, Daniela Henningsmeyer, John M Hudson, Donald B Johnson, An V Le, Stephen M Matyas, James V Stevens: User defined function facility. International Business Machines Corporation, Calfee Halter & Griswold, April 5, 1994: US05301231 (166 worldwide citation)

In a cryptographic module, a User Defined Function (UDF) facility is provided which provides users with the capability of defining and creating custom functions to meet their cryptographic processing needs. The cryptographic module is contained within a physically and logically secure environment an ...


7
Stephen M Matyas, Donald B Johnson, An V Le, Rostislaw Prymak, John D Wilkins, William C Martin, William S Rohland: Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors. International Business Machines Corporation, John E Hoel, August 25, 1992: US05142578 (162 worldwide citation)

The patent describes a method and apparatus for securely distributing an initial Data Encryption Algorithm (DEA) key-encrypting key by encrypting a key record (consisting of the key-encrypting key and control information associated with that key-encrypting key) using a public key algorithm and a pub ...


8
Stephen M Matyas, Donald B Johnson, An V Le, Rostislaw Prymak, John D Wilkins: Method for generating public and private key pairs without using a passphrase. International Business Machines Corporation, John E Hoel, April 6, 1993: US05201000 (142 worldwide citation)

A data processing system, program and method are disclosed for managing a public key cryptographic system which includes a public key, private key pair generator. The method includes the step of generating a first public key, private key pair using a first seed value known to a user, the first seed ...


9
Stephen M Matyas, Donald B Johnson, An V Le, Rostislaw Prymak, William C Martin, William S Rohland, John D Wilkins: Public key cryptosystem key management based on control vectors. International Business Machines Corporation, John E Hoel, April 6, 1993: US05200999 (138 worldwide citation)

A data processing system, method and program are disclosed, for managing a public key cryptographic system. The method includes the steps of generating a first public key and a first private key as a first pair in the data processing system, for use with a first public key algorithm and further gene ...


10
Stephen M Matyas, Dennis G Abraham, Donald B Johnson, Ramesh K Karne, An V Le, Rostislaw Prymak, Julian Thomas, John D Wilkins, Phil C Yeh: Secure management of keys using control vectors. International Business Machines Corporation, John E Hoel, July 10, 1990: US04941176 (119 worldwide citation)

The invention is an apparatus and method for validating that key management functions requested for a cryptographic key by the program have been authorized by the originator of the key. The invention includes a cryptographic facility characterized by a secure boundary through which passes an input p ...



Click the thumbnails below to visualize the patent trend.