1
Bernard J Halter, Alphonse M Bracco, Donald B Johnson, An V Le, Stephen M Matyas, Rostislaw Prymak deceased, James D Randall, John D Wilkins: Method and system for multimedia access control enablement. International Business Machines Corporation, John E Hoel, June 7, 1994: US05319705 (707 worldwide citation)

A method and system are disclosed for securely distributing a plurality of software files from a software distribution processor to a user processor, while selectively enabling the user processor to only use a subset of a lesser plurality of the software files. This is achieved by employing a custom ...


2
Paul C Hershey, Donald B Johnson, An V Le, Stephen M Matyas, John G Waclawsky, John D Wilkins: Network security system and method using a parallel finite state machine adaptive active monitor and responder. International Business Machines Corporation, Joseph C Redmond Jr, John E Hoel, John D Flynn, May 9, 1995: US05414833 (407 worldwide citation)

A system and method provide a security agent, consisting of a monitor and a responder, that respond to a detected security event in a data communications network, by producing and transmitting a security alert message to a network security manager. The alert is a security administration action which ...


3
Stephen M Matyas, Jonathan Oseas: Code protection using cryptography. International Business Machines Corporation, John E Hoel, Joseph C Clark George E Redmond Jr, July 12, 1988: US04757534 (248 worldwide citation)

A cryptographic method for discouraging the copying and sharing of purchased software programs allows an encrypted program to be run on only a designated computer or, alternatively, to be run on any computer but only by the user possessing a designated smart card. Each program offering sold by the s ...


4
George M Dolan, Christopher J Holloway, Stephen M Matyas Jr: Public key data communications system under control of a portable security device. International Business Machines Corporation, Kenneth A Seaman, February 18, 1997: US05604801 (247 worldwide citation)

A data communications system is described in which messages are processed using public key cryptography with a private key unique to one or more users (150) under the control of a portable security device (120), such as a smart card, held by each user, the system comprising: a server (130) for perfo ...


5
William F Ehrsam, Robert C Elander, Stephen M Matyas, Carl H W Meyer, Richard J Sahulka, Walter L Tuchman: Cryptographic file security for multiple domain networks. International Business Machines Corporation, Edwin Lester, May 13, 1980: US04203166 (203 worldwide citation)

A file security system for data files created at a first host system in one domain and recovered at a second host system in another domain of a multiple domain network. Each of said host systems contain a data security device provided with multiple host keys capable of performing a variety of crypto ...


6
Stephen M Matyas, Donald B Johnson, An V Le, Rostislaw Prymak, William C Martin, William S Rohland, John D Wilkins: Method to establish and enforce a network cryptographic security policy in a public key cryptosystem. International Business Machines Corporation, John E Hoel, November 17, 1992: US05164988 (194 worldwide citation)

Device A in a public key cryptographic network will be constrained to continue to faithfully practice a security policy dictated by a network certification center, long after device A's public key PUMa has been certified. If device A alters its operations from the limits encoded in its configuration ...


7
William F Ehrsam, Robert C Elander, Stephen M Matyas, Carl H W Meyer, John L Smith, Walter L Tuchman: Cryptographic file security for single domain networks. International Business Machines Corporation, Edwin Lester, December 9, 1980: US04238854 (189 worldwide citation)

A file security system for data files associated with a host data processing system. The host system includes a data security device which contains a secure host master key and is capable of performing a variety of cryptographic operations. At initialization time, the host system generates a series ...


8
Stephen M Matyas, Donald B Johnson, An V Le, Rostislaw Prymak, William C Martin, William S Rohland, John D Wilkins: Cryptographic facility environment backup/restore and replication in a public key cryptosystem. International Business Machines Corporation, John E Hoel, November 23, 1993: US05265164 (177 worldwide citation)

A computer apparatus, program and method function in a data processing system to replicate a cryptographic facility. The system includes a first cryptographic facility containing a portable part which personalizes the first cryptographic facility. The system also includes a second cryptographic faci ...


9
Bruno Brachtl, Christopher J Holloway, Richard E Lennon, Stephen M Matyas, Carl H Meyer, Jonathan Oseas: Transaction security system. International Business Machines Corporation, Edwin Lester, Frederick D Poag, John E Hoel, July 5, 1988: US04755940 (176 worldwide citation)

An electronic funds transfer system (EFT) is described in which retail terminals located in stores are connected through a public switched telecommunication system to card issuing agencies data processing centers. Users of the system are issued with intelligent secure bank cards, which include a mic ...


10
Richard H Guski, Raymond C Larson, Stephen M Matyas Jr, Donald B Johnson, Don Coppersmith: Authentication system using one-time passwords. International Business Machines Corporation, William A Kinnaman Jr, January 7, 1997: US05592553 (173 worldwide citation)

A system for authenticating a user located at a requesting node to a resource such as a host application located at an authenticating node using one-time passwords that change pseudorandomly with each request for authentication. At the requesting node a non-time-dependent value is generated from non ...