1
Steven A Bade, Robert H LeGrand III, Mark David J McLaughlin: System and method for providing access to mobile devices based on positional data. International Business Machines Corporation, Diana L Roberts, Edmond A DeFrank, August 17, 2004: US06778837 (52 worldwide citation)

The present invention includes as one embodiment a method for automatically controlling access to a mobile computing device with pertinent data. The method includes predefining access parameters of the mobile computing device, determining an actual location of the mobile computing device and using t ...


2
Steven A Bade, Linda Nancy Betz, Andrew Gregory Kegel, Michael J Kelly, William Lee Terrell: Method and system for virtualization of trusted platform modules. International Business Machines Corporation, Cardinal Law Group, May 27, 2008: US07380119 (51 worldwide citation)

A method, an apparatus, a system, and a computer program product is presented for virtualizing trusted platform modules within a data processing system. A virtual trusted platform module along with a virtual endorsement key is created within a physical trusted platform module within the data process ...


3
Steven A Bade, Thomas J Dewkett, Nia L Kelley, Siegfried Sutter, Helmut H Weber: Protocol for trusted platform module recovery through context checkpointing. International Business Machines Corporation, Yee & Associates P C, Casimer K Salys, November 24, 2009: US07624283 (19 worldwide citation)

A computer implemented method for recovering a partition context in the event of a system or hardware device failure. Upon receiving a command from a partition to modify context data in a trusted platform module (TPM) hardware device, a trusted platform module input/output host partition (TMPIOP) pr ...


4
Steven A Bade, Ryan Charles Catherman, James Patrick Hoff, Nia Letise Kelley, Emily Jane Ratliff: Method and system for providing a trusted platform module in a hypervisor environment. International Business Machines Corporation, Casimer K Salys, Jack V Musgrove, January 27, 2009: US07484091 (17 worldwide citation)

A method is presented for implementing a trusted computing environment within a data processing system. A hypervisor is initialized within the data processing system, and the hypervisor supervises a plurality of logical, partitionable, runtime environments within the data processing system. The hype ...


5
Steven A Bade, Ching Yun Chao: Method for using a portable computing device as a smart key device. International Business Machines Corporation, Matt Talpis, Gregory K Goshorn, Greg Goshorn P C, January 6, 2009: US07475247 (15 worldwide citation)

A first data processing system, which includes a first cryptographic device, is communicatively coupled with a second data processing system, which includes a second cryptographic device. The cryptographic devices then mutually authenticate themselves. The first cryptographic device stores a private ...


6
Steven A Bade, Ryan Charles Catherman, James Patrick Hoff, Nia Letise Kelley, Emily Jane Ratliff: Method, apparatus, and product for asserting physical presence with a trusted platform module in a hypervisor environment. International Business Machines Corporation, Duke W Yee, Diana L Roberts Gerhardt, Sarah B Foley, January 27, 2009: US07484099 (15 worldwide citation)

A method, apparatus, and computer program product are described for asserting physical presence in a trusted computing environment included within a data processing system. The trusted computing environment includes a trusted platform module (TPM). The data processing system is coupled to a hardware ...


7
Steven A Bade, David Carroll Challener: Method and system for verifying binding of an initial trusted device to a secured processing system. International Business Machines Corporation, Mitch Harris Atty at Law, Andrew M Harris, Casimer K Salys, November 28, 2006: US07143287 (12 worldwide citation)

A method and system for verifying binding of an initial trusted device to a secured processing system binds an initial device or replacement when no binding information is available from another device in the system. A platform credential is issued only when a valid binding is verified, by sending a ...


8
Steven A Bade, Stefan Berger, Kenneth Alan Goldman, Ronald Perez, Reiner Sailer, Leendert Peter Van Doorn: Dynamic creation and hierarchical organization of trusted platform modules. International Business Machines Corporation, Yee & Associates P C, October 1, 2013: US08549288 (10 worldwide citation)

A trusted platform module is presented that is capable of creating, dynamically, multiple virtual trusted platform modules in a hierarchical organization. A trusted platform module domain is created. The trusted platform module creates virtual trusted platform modules, as needed, in the trusted plat ...


9
Steven A Bade, David Carroll Challener: Method and system for backup and restore of a context encryption key for a trusted device within a secured processing system. International Business Machines Corporation, Mitch Harris, Andrew M Harris, Casimer K Salys, August 29, 2006: US07099477 (10 worldwide citation)

A method and system for backup and restore of a context encryption key (CEK) for a trusted device within a secured processing system maintains security of virtualized trusted device contexts, providing for replacement of a trusted device in the field. The CEK is encrypted along with a system identif ...


10
Steven A Bade, Charles Douglas Ball, Ryan Charles Catherman, James Patrick Hoff, James Peter Ward: Scalable paging of platform configuration registers. Lenovo Singapore, Winstead P C, January 26, 2010: US07653819 (8 worldwide citation)

A method, computer program, and system for paging platform configuration registers in and out of a trusted platform module. In a trusted computing platform, an unlimited number of platform configuration registers can be obtained through paging. The trust platform module encrypts and decrypts platfor ...