Patents by Inventor John T. Peck
John T. Peck has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240157409Abstract: A cleaning device (100) for cleaning fiber optic end faces comprises a dispensing nozzle (104) configured to discharge a jet column (118) generated by the Coanda effect with intermittent injection of a cleaning solvent into the jet column (118). The method comprises impinging the jet column (118) onto a fiber optic end face (120) while maintaining a stand-off distance from the end face being cleaned.Type: ApplicationFiled: April 5, 2022Publication date: May 16, 2024Inventors: Emily J. Peck, Samuel Lindeyer, John T. Doty, Richard M. Hoffman, Jay S. Tourigny
-
Publication number: 20210258301Abstract: Mechanisms are provided, in a communication device associated with a first computing device, for capturing security data exchanged between the first computing device and a second computing device. The mechanisms receive a data message from either the first computing device or the second computing device. The data message is part of an operation for establishing a secure communication connection between the first computing device and the second computing device. The mechanisms filter the received data message for security data passed in the received data message and mirror the security data to an analysis port of the communication device. Moreover, the mechanisms output, via the analysis port, the security data to a data collection and analysis system that analyzes the security data with regard to security requirement compliance.Type: ApplicationFiled: May 3, 2021Publication date: August 19, 2021Inventors: Thomas H. Benjamin, Steven E.T. Hikida, John T. Peck, Bruce A. Rich, Richard L. Robinson
-
Patent number: 11025612Abstract: Mechanisms are provided, in a communication device associated with a first computing device, for capturing security data exchanged between the first computing device and a second computing device. The mechanisms receive a data message from either the first computing device or the second computing device. The data message is part of an operation for establishing a secure communication connection between the first computing device and the second computing device. The mechanisms filter the received data message for security data passed in the received data message and mirror the security data to an analysis port of the communication device. Moreover, the mechanisms output, via the analysis port, the security data to a data collection and analysis system that analyzes the security data with regard to security requirement compliance.Type: GrantFiled: May 6, 2019Date of Patent: June 1, 2021Inventors: Thomas H. Benjamin, Steven E. T. Hikida, John T. Peck, Bruce A. Rich, Richard L. Robinson
-
Patent number: 10523424Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: GrantFiled: September 8, 2017Date of Patent: December 31, 2019Assignee: International Business Machines CorporationInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Publication number: 20190260735Abstract: Mechanisms are provided, in a communication device associated with a first computing device, for capturing security data exchanged between the first computing device and a second computing device. The mechanisms receive a data message from either the first computing device or the second computing device. The data message is part of an operation for establishing a secure communication connection between the first computing device and the second computing device. The mechanisms filter the received data message for security data passed in the received data message and mirror the security data to an analysis port of the communication device. Moreover, the mechanisms output, via the analysis port, the security data to a data collection and analysis system that analyzes the security data with regard to security requirement compliance.Type: ApplicationFiled: May 6, 2019Publication date: August 22, 2019Inventors: Thomas H. Benjamin, Steven E. T. Hikida, John T. Peck, Bruce A. Rich, Richard L. Robinson
-
Patent number: 10284542Abstract: Mechanisms are provided, in a communication device associated with a first computing device, for capturing security data exchanged between the first computing device and a second computing device. The mechanisms receive a data message from either the first computing device or the second computing device. The data message is part of an operation for establishing a secure communication connection between the first computing device and the second computing device. The mechanisms filter the received data message for security data passed in the received data message and mirror the security data to an analysis port of the communication device. Moreover, the mechanisms output, via the analysis port, the security data to a data collection and analysis system that analyzes the security data with regard to security requirement compliance.Type: GrantFiled: August 21, 2015Date of Patent: May 7, 2019Assignee: International Business Machines CorporationInventors: Thomas H. Benjamin, Steven E. T. Hikida, John T. Peck, Bruce A. Rich, Richard L. Robinson
-
Patent number: 9881173Abstract: A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information.Type: GrantFiled: June 27, 2016Date of Patent: January 30, 2018Assignee: International Business Machines CorporationInventors: Kristin M. Hazlewood, John T. Peck, Krishna K. Yellepeddy
-
Publication number: 20180013548Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: ApplicationFiled: September 8, 2017Publication date: January 11, 2018Inventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Patent number: 9794063Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: GrantFiled: January 27, 2014Date of Patent: October 17, 2017Assignee: International Business Machines CorporationInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Patent number: 9594920Abstract: A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information.Type: GrantFiled: March 20, 2012Date of Patent: March 14, 2017Assignee: International Business Machines CorporationInventors: Kristin M. Hazlewood, John T. Peck, Krishna K. Yellepeddy
-
Publication number: 20170054709Abstract: Mechanisms are provided, in a communication device associated with a first computing device, for capturing security data exchanged between the first computing device and a second computing device. The mechanisms receive a data message from either the first computing device or the second computing device. The data message is part of an operation for establishing a secure communication connection between the first computing device and the second computing device. The mechanisms filter the received data message for security data passed in the received data message and mirror the security data to an analysis port of the communication device. Moreover, the mechanisms output, via the analysis port, the security data to a data collection and analysis system that analyzes the security data with regard to security requirement compliance.Type: ApplicationFiled: August 21, 2015Publication date: February 23, 2017Inventors: Thomas H. Benjamin, Steven E.T. Hikida, John T. Peck, Bruce A. Rich, Richard L. Robinson
-
Publication number: 20160306983Abstract: A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information.Type: ApplicationFiled: June 27, 2016Publication date: October 20, 2016Inventors: Kristin M. Hazlewood, John T. Peck, Krishna K. Yellepeddy
-
Patent number: 9378388Abstract: A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information.Type: GrantFiled: April 20, 2010Date of Patent: June 28, 2016Assignee: International Business Machines CorporationInventors: Kristin M. Hazlewood, John T. Peck, Krishna K. Yellepeddy
-
Publication number: 20140177842Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: ApplicationFiled: January 27, 2014Publication date: June 26, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Patent number: 8724817Abstract: A method for managing keys in a computer memory including receiving a request to store a first key to a first key repository, storing the first key to a second key repository in response to the request, and storing the first key from the second key repository to the first key repository within said computer memory based on a predetermined periodicity.Type: GrantFiled: April 30, 2012Date of Patent: May 13, 2014Assignee: International Business Machines CorporationInventors: Bruce A. Rich, Thomas H. Benjamin, John T. Peck
-
Patent number: 8683222Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: GrantFiled: March 1, 2012Date of Patent: March 25, 2014Assignee: International Business Machines CorporationInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Patent number: 8675875Abstract: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.Type: GrantFiled: May 18, 2010Date of Patent: March 18, 2014Assignee: International Business Machines CorporationInventors: Krishna K. Yellepeddy, John T. Peck, Kristin M. Hazlewood, John A. Morganti
-
Patent number: 8630418Abstract: A system or computer usable program product for managing keys in a computer memory including receiving a request to store a first key to a first key repository, storing the first key to a second key repository in response to the request, and storing the first key from the second key repository to the first key repository within said computer memory based on a predetermined periodicity.Type: GrantFiled: January 5, 2011Date of Patent: January 14, 2014Assignee: International Business Machines CorporationInventors: Bruce A. Rich, Thomas H. Benjamin, John T. Peck
-
Patent number: 8422686Abstract: A method for automated validation and execution of cryptographic key and certificate deployment and distribution includes providing one or more keys; providing one or more key deployment points; and distributing the one or more keys to the one or more key deployment points in an automated manner based on a matrix or pattern mapping of each of the one or more keys to be distributed to each of the one or more key deployment points.Type: GrantFiled: June 19, 2008Date of Patent: April 16, 2013Assignee: International Business Machines CorporationInventors: Christian Cachin, Robert Haas, Timothy J. Hahn, Xiaoyu Hu, Ilias Iliadis, Rene Pawlitzek, John T. Peck
-
Publication number: 20120213369Abstract: A method for managing keys in a computer memory including receiving a request to store a first key to a first key repository, storing the first key to a second key repository in response to the request, and storing the first key from the second key repository to the first key repository within said computer memory based on a predetermined periodicity.Type: ApplicationFiled: April 30, 2012Publication date: August 23, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bruce A. Rich, Thomas H. Benjamin, John T. Peck