Patents by Inventor James Riordan
James Riordan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8305841Abstract: A method and apparatus for determining the topography of a seafloor includes providing a vessel with a multibeam sonar device which transmits first pulses of first signals, and a pair of sidescan sonar devices, which transmit second pulses of second signals, spaced apart rearwardly from the multibeam sonar device on the vessel. The first and second pulses produced by the multibeam sonar device and the sidescan sonar devices, respectively, are interleaved, and the time duration between each second pulse and the next following first pulse, and between each first pulse and the next following one of the first and second pulses is determined as a function of the maximum time-of-flight of the first signals of one of the previous first pulses from the time of transmission thereof to the time of reception of the backscattered first signals.Type: GrantFiled: June 16, 2008Date of Patent: November 6, 2012Assignee: University of LimerickInventors: James Riordan, Daniel Toal, Edward Thurman
-
Publication number: 20100157736Abstract: A method and apparatus for determining the topography of a seafloor comprises providing a vessel (1) with a multibeam sonar device (5) and a pair of sidescan sonar devices (10) spaced apart rearwardly from the multibeam sonar device (5) on the vessel (2). The multibeam sonar device (5) transmits first pulses of first signals directly downwardly towards the seafloor with a wide fan angle (?) in a first vertical transverse plane (7). The sidescan sonar devices (10) direct second pulses of second signals of similar wavelength to those of the first signals downwardly and sidewardly outwardly of the vessel (2) with a wide fan angle (?) in a second vertical transverse plane (11).Type: ApplicationFiled: June 16, 2008Publication date: June 24, 2010Applicant: University of LimerickInventors: James Riordan, Daniel Toal, Edward Thurman
-
Publication number: 20070094728Abstract: The present invention provides a method for generating from requests from a first data network attack signatures for use in a second data network having a plurality of addresses assigned to data processing systems, the method comprising receiving data traffic from the first data network addressed to a number of unassigned addresses in a third data network; inspecting several incidents of the received data traffic for a common data pattern, upon finding a said data pattern, determining from the corresponding data traffic the attack signature for use in detecting attacks for the second data network. The invention also provides an apparatus for generating from requests on a first data network attack signatures for use in a second data network having a plurality of addresses assigned to data processing systems.Type: ApplicationFiled: November 24, 2003Publication date: April 26, 2007Inventors: Klaus Julisch, James Riordan
-
Publication number: 20070094722Abstract: Described is a technique for detecting attacks on a data communications network having a plurality of addresses for assignment to data processing systems in the network. The technique involves identifying data traffic on the network originating at any assigned address and addressed to any unassigned address. Any data traffic so identified is inspected for data indicative of an attack. On detection of data indicative of an attack, an alert signal is generated.Type: ApplicationFiled: November 20, 2003Publication date: April 26, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: James Riordan
-
Patent number: 7134018Abstract: The invention provides a general and flexible mechanism for a secure access control on a computer. Cryptographic checksums are applied for the identification of a program to another program. These cryptographic checksums are generated automatically for the programs. Each program has its program-specific identifier which can be regarded as a substantially unique value or name. Such a program-specific identifier can be used to verify the validity of one program to another program. Mutual trust relationships between different programs can therewith be set up easily.Type: GrantFiled: March 14, 2001Date of Patent: November 7, 2006Inventor: James Riordan
-
Publication number: 20060106802Abstract: An apparatus and method are disclosed for enabling controlled access to resources at a resource provider server. The invention may encrypt or decrypt a portion of a uniform resource identifier (URI), according to a stateless method for hiding resources and/or providing access control support. Upon receipt of a URI having an encrypted portion, the invention decrypts the encrypted portion using a predetermined key to obtain a decrypted segment, extracts additional information from the decrypted segment and forms a decrypted URI, before the decrypted URI is forwarded to a resource producer server. The invention may also encrypt a URI from a resource provider server before it is sent to a client in response to a client request.Type: ApplicationFiled: November 18, 2004Publication date: May 18, 2006Applicant: International Business Machines CorporationInventors: Christopher Giblin, Tadeusz Pietraszek, James Riordan, Chris Vanden Berghe
-
Patent number: 6996719Abstract: The invention provides a mechanism for a secure password entry by using cryptographic functions. This mechanism is applicable to the access of computers and programs. Upon a request of a program E a password p is read-in by receiving a program-specific identifier H(E) from the program E, receiving the password p, and generating from at least the program-specific identifier H(E) and the received password p a program-password-specific identifier F(H(E),p). The program-password-specific identifier F(H(E),p) is sent to the program E which then further processes the program-password-specific identifier F(H(E),p).Type: GrantFiled: March 14, 2001Date of Patent: February 7, 2006Assignee: International Business Machines CorporationInventor: James Riordan
-
Publication number: 20050022026Abstract: Detection of an attack on a data processing system. An example method comprising, in the data processing system: providing an initial secret; binding the initial secret to data indicative of an initial state of the system via a cryptographic function; recording state changing administrative actions performed on the system in a log; prior to performing each state changing administrative action, generating a new secret by performing the cryptographic function on a combination of data indicative of the administrative action and the previous secret, and erasing the previous secret; evolving the initial secret based on the log to produce an evolved secret; comparing the evolved secret with the new secret; determining that the system is uncorrupted if the comparison indicates a match between the evolved secret and the new secret; and, determining that the system in corrupted if the comparison indicate a mismatch between the evolved secret and the new secret.Type: ApplicationFiled: March 26, 2004Publication date: January 27, 2005Applicant: International Business Machines CorporationInventor: James Riordan
-
Publication number: 20020083328Abstract: The invention provides a mechanism for a secure password entry by using cryptographic functions. This mechanism is applicable to the access of computers and programs. Upon a request of a program E a password p is read-in by receiving a program-specific identifier H(E) from the program E, receiving the password p, and generating from at least the program-specific identifier H(E) and the received password p a program-password-specific identifier F(H(E),p). The program-password-specific identifier F(H(E),p) is sent to the program E which then further processes the program-password-specific identifier F(H(E),p).Type: ApplicationFiled: March 14, 2001Publication date: June 27, 2002Inventor: James Riordan
-
Publication number: 20020066016Abstract: The invention provides a general and flexible mechanism for a secure access control on a computer. Cryptographic checksums are applied for the identification of a program to another program. These cryptographic checksums are generated automatically for the programs. Each program has its program-specific identifier which can be regarded as a substantially unique value or name. Such a program-specific identifier can be used to verify the validity of one program to another program. Mutual trust relationships between different programs can therewith be set up easily.Type: ApplicationFiled: March 14, 2001Publication date: May 30, 2002Applicant: International Business Machines CorporationInventor: James Riordan
-
Patent number: 5890688Abstract: A card mounting device for releasably mounting a business or calling card on the surface of a support includes a flexible sheet of paper having adhesive applied to one side thereof on one half of the sheet of paper and adhesive applied to the other side thereof on the other half of the sheet of paper.Type: GrantFiled: October 2, 1997Date of Patent: April 6, 1999Inventor: James Riordan