Patents by Inventor James Riordan

James Riordan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8305841
    Abstract: A method and apparatus for determining the topography of a seafloor includes providing a vessel with a multibeam sonar device which transmits first pulses of first signals, and a pair of sidescan sonar devices, which transmit second pulses of second signals, spaced apart rearwardly from the multibeam sonar device on the vessel. The first and second pulses produced by the multibeam sonar device and the sidescan sonar devices, respectively, are interleaved, and the time duration between each second pulse and the next following first pulse, and between each first pulse and the next following one of the first and second pulses is determined as a function of the maximum time-of-flight of the first signals of one of the previous first pulses from the time of transmission thereof to the time of reception of the backscattered first signals.
    Type: Grant
    Filed: June 16, 2008
    Date of Patent: November 6, 2012
    Assignee: University of Limerick
    Inventors: James Riordan, Daniel Toal, Edward Thurman
  • Publication number: 20100157736
    Abstract: A method and apparatus for determining the topography of a seafloor comprises providing a vessel (1) with a multibeam sonar device (5) and a pair of sidescan sonar devices (10) spaced apart rearwardly from the multibeam sonar device (5) on the vessel (2). The multibeam sonar device (5) transmits first pulses of first signals directly downwardly towards the seafloor with a wide fan angle (?) in a first vertical transverse plane (7). The sidescan sonar devices (10) direct second pulses of second signals of similar wavelength to those of the first signals downwardly and sidewardly outwardly of the vessel (2) with a wide fan angle (?) in a second vertical transverse plane (11).
    Type: Application
    Filed: June 16, 2008
    Publication date: June 24, 2010
    Applicant: University of Limerick
    Inventors: James Riordan, Daniel Toal, Edward Thurman
  • Publication number: 20070094728
    Abstract: The present invention provides a method for generating from requests from a first data network attack signatures for use in a second data network having a plurality of addresses assigned to data processing systems, the method comprising receiving data traffic from the first data network addressed to a number of unassigned addresses in a third data network; inspecting several incidents of the received data traffic for a common data pattern, upon finding a said data pattern, determining from the corresponding data traffic the attack signature for use in detecting attacks for the second data network. The invention also provides an apparatus for generating from requests on a first data network attack signatures for use in a second data network having a plurality of addresses assigned to data processing systems.
    Type: Application
    Filed: November 24, 2003
    Publication date: April 26, 2007
    Inventors: Klaus Julisch, James Riordan
  • Publication number: 20070094722
    Abstract: Described is a technique for detecting attacks on a data communications network having a plurality of addresses for assignment to data processing systems in the network. The technique involves identifying data traffic on the network originating at any assigned address and addressed to any unassigned address. Any data traffic so identified is inspected for data indicative of an attack. On detection of data indicative of an attack, an alert signal is generated.
    Type: Application
    Filed: November 20, 2003
    Publication date: April 26, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: James Riordan
  • Patent number: 7134018
    Abstract: The invention provides a general and flexible mechanism for a secure access control on a computer. Cryptographic checksums are applied for the identification of a program to another program. These cryptographic checksums are generated automatically for the programs. Each program has its program-specific identifier which can be regarded as a substantially unique value or name. Such a program-specific identifier can be used to verify the validity of one program to another program. Mutual trust relationships between different programs can therewith be set up easily.
    Type: Grant
    Filed: March 14, 2001
    Date of Patent: November 7, 2006
    Inventor: James Riordan
  • Publication number: 20060106802
    Abstract: An apparatus and method are disclosed for enabling controlled access to resources at a resource provider server. The invention may encrypt or decrypt a portion of a uniform resource identifier (URI), according to a stateless method for hiding resources and/or providing access control support. Upon receipt of a URI having an encrypted portion, the invention decrypts the encrypted portion using a predetermined key to obtain a decrypted segment, extracts additional information from the decrypted segment and forms a decrypted URI, before the decrypted URI is forwarded to a resource producer server. The invention may also encrypt a URI from a resource provider server before it is sent to a client in response to a client request.
    Type: Application
    Filed: November 18, 2004
    Publication date: May 18, 2006
    Applicant: International Business Machines Corporation
    Inventors: Christopher Giblin, Tadeusz Pietraszek, James Riordan, Chris Vanden Berghe
  • Patent number: 6996719
    Abstract: The invention provides a mechanism for a secure password entry by using cryptographic functions. This mechanism is applicable to the access of computers and programs. Upon a request of a program E a password p is read-in by receiving a program-specific identifier H(E) from the program E, receiving the password p, and generating from at least the program-specific identifier H(E) and the received password p a program-password-specific identifier F(H(E),p). The program-password-specific identifier F(H(E),p) is sent to the program E which then further processes the program-password-specific identifier F(H(E),p).
    Type: Grant
    Filed: March 14, 2001
    Date of Patent: February 7, 2006
    Assignee: International Business Machines Corporation
    Inventor: James Riordan
  • Publication number: 20050022026
    Abstract: Detection of an attack on a data processing system. An example method comprising, in the data processing system: providing an initial secret; binding the initial secret to data indicative of an initial state of the system via a cryptographic function; recording state changing administrative actions performed on the system in a log; prior to performing each state changing administrative action, generating a new secret by performing the cryptographic function on a combination of data indicative of the administrative action and the previous secret, and erasing the previous secret; evolving the initial secret based on the log to produce an evolved secret; comparing the evolved secret with the new secret; determining that the system is uncorrupted if the comparison indicates a match between the evolved secret and the new secret; and, determining that the system in corrupted if the comparison indicate a mismatch between the evolved secret and the new secret.
    Type: Application
    Filed: March 26, 2004
    Publication date: January 27, 2005
    Applicant: International Business Machines Corporation
    Inventor: James Riordan
  • Publication number: 20020083328
    Abstract: The invention provides a mechanism for a secure password entry by using cryptographic functions. This mechanism is applicable to the access of computers and programs. Upon a request of a program E a password p is read-in by receiving a program-specific identifier H(E) from the program E, receiving the password p, and generating from at least the program-specific identifier H(E) and the received password p a program-password-specific identifier F(H(E),p). The program-password-specific identifier F(H(E),p) is sent to the program E which then further processes the program-password-specific identifier F(H(E),p).
    Type: Application
    Filed: March 14, 2001
    Publication date: June 27, 2002
    Inventor: James Riordan
  • Publication number: 20020066016
    Abstract: The invention provides a general and flexible mechanism for a secure access control on a computer. Cryptographic checksums are applied for the identification of a program to another program. These cryptographic checksums are generated automatically for the programs. Each program has its program-specific identifier which can be regarded as a substantially unique value or name. Such a program-specific identifier can be used to verify the validity of one program to another program. Mutual trust relationships between different programs can therewith be set up easily.
    Type: Application
    Filed: March 14, 2001
    Publication date: May 30, 2002
    Applicant: International Business Machines Corporation
    Inventor: James Riordan
  • Patent number: 5890688
    Abstract: A card mounting device for releasably mounting a business or calling card on the surface of a support includes a flexible sheet of paper having adhesive applied to one side thereof on one half of the sheet of paper and adhesive applied to the other side thereof on the other half of the sheet of paper.
    Type: Grant
    Filed: October 2, 1997
    Date of Patent: April 6, 1999
    Inventor: James Riordan