Patents by Inventor David G. Wheeler

David G. Wheeler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11776574
    Abstract: Techniques for authentication of digital recordings are provided. An element of encrypted data is output in a recording environment. The element of encrypted data, embedded in a digital recording comprising at least one of audio data and image data captured in the recording environment, is extracted. A decrypted value is generated based on a private key and the first element of encrypted data, and the first decrypted value and a stored value associated with a first element of the digital recording are compared. The digital recording is authenticated based on the first decrypted value substantially matching the stored value.
    Type: Grant
    Filed: December 21, 2020
    Date of Patent: October 3, 2023
    Assignee: International Business Machines Corporation
    Inventors: Chad M. Albertson, Mark S. Fredrickson, David G. Wheeler, Scott D. Frei
  • Patent number: 11341034
    Abstract: Techniques for analysis of verification parameters and reduction of training data are provided. A plurality of test results is received, where each of the plurality of test results specifies a respective one or more parameters and a respective one or more events. A list of parameters used to stimulate computing logic is determined. Additionally, a plurality of relevant parameters is generated, corresponding to parameters in the list of parameters that have at least two distinct values specified in the plurality of test results. A plurality of training cases is generated based on the plurality of test results and the plurality of relevant parameters. Further, a neural network is generated for design verification of the computing logic based on the plurality of relevant parameters. The neural network is trained based on the plurality of training cases.
    Type: Grant
    Filed: August 6, 2018
    Date of Patent: May 24, 2022
    Assignee: International Business Machines Corporation
    Inventors: Chad Albertson, John Borkenhagen, Scott D. Frei, David G. Wheeler, Mark S. Fredrickson
  • Patent number: 11263332
    Abstract: A computer system, processor, and method for processing information is disclosed that includes watching logical operations to detect unauthorized attempts to access a register, and taking evasive action in response to detecting unauthorized attempts to access the register. In an embodiment, the register is a hidden, secret, restricted, or undocumented register, and the method further includes, in response to unauthorized attempts to access the secret register, locking the contents of the secret register. The evasive action may include one or more of interrupting the operations of the processor; causing the processor to shut-down, malfunction, lock, self-destruct; no longer providing read or write permission or access to the register; releasing data disguised to look like the real register data while not releasing the real data; and combinations thereof.
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: March 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Mark Fredrickson, Chad Albertson, Scott D. Frei, David G. Wheeler
  • Patent number: 11184354
    Abstract: Techniques for enhanced security for disconnected devices are provided. A request for one or more attributes of a security component is received by the security component, from a requesting device. The one or more attributes are provided to the requesting device, where the requesting device transmits the one or more attributes to a network service, where the security component is not able to communicate with the network service. A token is received from the requesting device, where the requesting device received the token in response to transmitting the one or more attributes to the network service. A level of access is determined for the requesting device, based on validating the token using a predefined configuration of the security component. Finally, the determined level of access is provided to the requesting device.
    Type: Grant
    Filed: March 22, 2019
    Date of Patent: November 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Chad Albertson, David G. Wheeler, Scott D. Frei, Mark S. Fredrickson
  • Publication number: 20210151081
    Abstract: Techniques for authentication of digital recordings are provided. An element of encrypted data is output in a recording environment. The element of encrypted data, embedded in a digital recording comprising at least one of audio data and image data captured in the recording environment, is extracted. A decrypted value is generated based on a private key and the first element of encrypted data, and the first decrypted value and a stored value associated with a first element of the digital recording are compared. The digital recording is authenticated based on the first decrypted value substantially matching the stored value.
    Type: Application
    Filed: December 21, 2020
    Publication date: May 20, 2021
    Inventors: Chad ALBERTSON, Mark S. FREDRICKSON, David G. WHEELER, Scott D. FREI
  • Patent number: 10957355
    Abstract: Performing an operation comprising extracting a first element of encrypted data embedded in a digital recording comprising at least one of audio data and image data captured in a recording environment, generating a first decrypted value, the generating performed by execution of a cryptography algorithm based on a private key and the first element of encrypted data, comparing the first decrypted value and a stored value associated with a first element of the digital recording, and authenticating the digital recording based on the first decrypted value substantially matching the stored value.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: March 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Chad M. Albertson, Mark S. Fredrickson, David G. Wheeler, Scott D. Frei
  • Publication number: 20200304495
    Abstract: Techniques for enhanced security for disconnected devices are provided. A request for one or more attributes of a security component is received by the security component, from a requesting device. The one or more attributes are provided to the requesting device, where the requesting device transmits the one or more attributes to a network service, where the security component is not able to communicate with the network service. A token is received from the requesting device, where the requesting device received the token in response to transmitting the one or more attributes to the network service. A level of access is determined for the requesting device, based on validating the token using a predefined configuration of the security component. Finally, the determined level of access is provided to the requesting device.
    Type: Application
    Filed: March 22, 2019
    Publication date: September 24, 2020
    Inventors: Chad ALBERTSON, David G. WHEELER, Scott D. FREI, Mark S. FREDRICKSON
  • Publication number: 20200042434
    Abstract: Techniques for analysis of verification parameters and reduction of training data are provided. A plurality of test results is received, where each of the plurality of test results specifies a respective one or more parameters and a respective one or more events. A list of parameters used to stimulate computing logic is determined. Additionally, a plurality of relevant parameters is generated, corresponding to parameters in the list of parameters that have at least two distinct values specified in the plurality of test results. A plurality of training cases is generated based on the plurality of test results and the plurality of relevant parameters. Further, a neural network is generated for design verification of the computing logic based on the plurality of relevant parameters. The neural network is trained based on the plurality of training cases.
    Type: Application
    Filed: August 6, 2018
    Publication date: February 6, 2020
    Inventors: Chad ALBERTSON, John BORKENHAGEN, Scott D. FREI, David G. WHEELER, Mark S. FREDRICKSON
  • Publication number: 20200042730
    Abstract: A computer system, processor, and method for processing information is disclosed that includes watching logical operations to detect unauthorized attempts to access a register, and taking evasive action in response to detecting unauthorized attempts to access the register. In an embodiment, the register is a hidden, secret, restricted, or undocumented register, and the method further includes, in response to unauthorized attempts to access the secret register, locking the contents of the secret register. The evasive action may include one or more of interrupting the operations of the processor; causing the processor to shut-down, malfunction, lock, self-destruct; no longer providing read or write permission or access to the register; releasing data disguised to look like the real register data while not releasing the real data; and combinations thereof.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Inventors: Mark Fredrickson, Chad Albertson, Scott D. Frei, David G. Wheeler
  • Publication number: 20190267036
    Abstract: Performing an operation comprising extracting a first element of encrypted data embedded in a digital recording comprising at least one of audio data and image data captured in a recording environment, generating a first decrypted value, the generating performed by execution of a cryptography algorithm based on a private key and the first element of encrypted data, comparing the first decrypted value and a stored value associated with a first element of the digital recording, and authenticating the digital recording based on the first decrypted value substantially matching the stored value.
    Type: Application
    Filed: February 28, 2018
    Publication date: August 29, 2019
    Inventors: Chad M. ALBERTSON, Mark S. FREDRICKSON, David G. WHEELER, Scott D. FREI
  • Patent number: 7916048
    Abstract: A method an apparatus is provided to generate a gray code sequence from a sequence of binary values having a length ā€œLā€. Accordingly, one aspect of the present invention provides a circuit comprising a cycle flag toggle circuit configured to toggle a cycle flag between a first value and a second value, an intermediate value generator coupled to an output of the cycle flag toggle circuit configured to receive the binary value, and configured to generate an intermediate value from the cycle flag and the binary value, and a binary to gray converter coupled to an output of the intermediate value generator, configured to convert the intermediate value to a gray code.
    Type: Grant
    Filed: February 3, 2010
    Date of Patent: March 29, 2011
    Assignee: International Business Machines Corporation
    Inventors: Jayashri A. Basappa, Anil Pothireddy, David G. Wheeler