Patents by Inventor Patrick Ryan Wardrop
Patrick Ryan Wardrop has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9461817Abstract: The confidentiality of JavaScript Object Notation (JSON) message data is secured using an encryption scheme. The encryption scheme implements a JSON encryption syntax, together with a set of processing rules for creating encrypting arbitrary data in JSON messages in a platform/language independent manner. A method for encrypting a data item in a JSON message begins by applying an encryption method and a key to the data item to generate a cipher value. A data object is then constructed that represents an encryption of the data item. The data item in the JSON message is then replaced with the data object, and the resulting modified JSON message is then output from a sending entity. At a receiving entity, information in the data object is used to re-generate the data item, which is then placed back in the original message.Type: GrantFiled: January 20, 2009Date of Patent: October 4, 2016Assignee: International Business Machines CorporationInventors: Timothy Walter Moore, Patrick Ryan Wardrop
-
Patent number: 9325695Abstract: A method, system, and computer usable program product for token caching in a trust chain processing are provided in the illustrative embodiments. An information in a token associated with a first request is mapped. A determination is made whether a requester of the first request has provided a constraint in the first request, the constraint concerning the token, the constraint forming a client constraint. The client constraint is stored. The information and the mapped information is stored, forming stored information. The token is received in a second request. The stored information is reused if the client constraint allows reusing the stored information. A further determination may be made whether a target system receiving the mapped information has provided a server constraint, the second constraint concerning the mapped information, the second constraint forming a server constraint. The stored information may be reused if the server constraint allows reusing the stored information.Type: GrantFiled: December 4, 2008Date of Patent: April 26, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David Werner Bachmann, Nicholas George Harlow, Heather Maria Hinton, Patrick Ryan Wardrop
-
Patent number: 9137188Abstract: Methods, systems, and computer program products are provided for controlling a GUI display for a plug-in in an application supporting plug-ins. Embodiments include receiving, at run time, in the application from the plug-in a request to display a GUI object; responsive to the request, retrieving an XML representation of the GUI object; and displaying the GUI object in dependence upon the retrieved XML representation of the GUI object. Typical embodiments also include receiving from the plug-in a request to retrieve user input responsive to the GUI object; and returning to the plug-in responsive user input.Type: GrantFiled: July 10, 2008Date of Patent: September 15, 2015Assignee: International Business Machines CorporationInventors: Matthew Paul Duggan, Dolapo Martin Falola, Patrick Ryan Wardrop
-
Patent number: 8528063Abstract: Methods, systems, and computer program products are provided for cross domain security information conversion. Embodiments include receiving from a system entity, in a security service, security information in a native format of a first security domain regarding a system entity having an identity in at least one security domain; translating the security information to a canonical format for security information; transforming the security information in the canonical format using a predefined mapping from the first security domain to a second security domain; translating the transformed security information in the canonical format to a native format of the second security domain; and returning to the system entity the security information in the native format of the second security domain.Type: GrantFiled: March 31, 2004Date of Patent: September 3, 2013Assignee: International Business Machines CorporationInventors: Matthew Paul Duggan, Dolapo Martin Falola, Patrick Ryan Wardrop
-
Patent number: 8522335Abstract: A method and system for mediating security tokens to authorization data transactions in a data management system. The methods and systems intercept a data request between two applications or services, and validate and translate a security token sent with the data request from a format compatible with the first application or service to a format compatible with the second application or service.Type: GrantFiled: December 1, 2009Date of Patent: August 27, 2013Assignee: International Business Machines CorporationInventors: Calvin D Lawrence, Miguel A Ortiz, Patrick Ryan Wardrop
-
Patent number: 8291230Abstract: A machine-implemented method for signing a JSON message begins by constructing a reference element for each data object in the JSON message. The data object is identified by a reference identifier that includes a pointer to a digest method, and a digest generated by applying the digest method to the data object. Then, a signature information element is constructed for reference elements corresponding to data objects in the message. The signature information element includes a pointer to a signature method, as well as one or more reference elements, or a canonical form of the one or more reference elements. Then, a signature element is constructed that includes the signature information element, and a signature value generated by applying the signature method to the signature information element. The signature enables a sending entity to generate a digest on a JSON message and to secure the digests using a signing key.Type: GrantFiled: January 20, 2009Date of Patent: October 16, 2012Assignee: International Business Machines CorporationInventors: Timothy Walter Moore, Patrick Ryan Wardrop, Michael McIntosh
-
Patent number: 8181225Abstract: The invention provides federated functionality within a data processing system by means of a set of specialized runtimes, which are instances of an application for providing federation services to requesters. Each of the plurality of specialized runtimes provides requested federation services for selected ones of the requestors according to configuration data of respective federation relationships of the requestors with the identity provider. The configuration data is dynamically retrieved during initialization of the runtimes which allows the respective_runtime to be specialized for a given federation relationship. Requests are routed to the appropriate specialized runtime using the first requestor identity and the given federation relationship. The data, which describes each federation relationship between the identity provider and each of the plurality of requestors, is configured prior to initialization of the runtimes.Type: GrantFiled: June 9, 2009Date of Patent: May 15, 2012Assignee: International Business Machines CorporationInventors: Heather Maria Hinton, Anthony Scott Moran, Dolapo Martin Falola, Ivan Matthew Milman, Patrick Ryan Wardrop
-
Patent number: 8141139Abstract: Federated single sign on (F-SSO) uses a token service that fulfills requests by executing a module chain comprising a set of modules. F-SSO runtime processing is enhanced by enabling a federated entity user to define a custom module to include in the chain. The custom module includes one or more name-value pairs, wherein a given name-value pair has a value that may be validated against an entity-defined rule. The rule is determined during the processing of the custom module based on one or more invocation parameters of the module chain. In a runtime operation, F-SSO begins in response to receipt of a token. In response, the processing of the module chain that includes the custom module is initiated. During processing of the custom module, an attempt is made to validate the value of a name-value pair based on the rule. If the value of the name-value pair based on the rule can be validated, processing of the module chain continues.Type: GrantFiled: November 14, 2007Date of Patent: March 20, 2012Assignee: International Business Machines CorporationInventors: Heather Maria Hinton, Patrick Ryan Wardrop, Parley Avery Salmon
-
Patent number: 8140643Abstract: A method of managing user personal information across a set of service provider sites is implemented, preferably as a web browser plug-in function. As a user navigates to a service provider web site and performs an interaction involving user identity attribute data, the interaction is recorded for later replay. Typically, the interaction is a graphical user interface (GUI) interaction. At a later time, previously-recorded interactions at service provider sites are replayed automatically, i.e., without requiring the user to navigate back to the individual sites and perform the interactions, and (during the replay operation) the user's previously-entered identity attribute data is located and retrieved. A display of the identity attribute data collected from the service provider sites then can be examined, e.g., for any inconsistency among the data.Type: GrantFiled: June 30, 2008Date of Patent: March 20, 2012Assignee: International Business Machines CorporationInventors: Jiayue Chen, Matthew Paul Duggan, Patrick Ryan Wardrop
-
Patent number: 8136146Abstract: A computer implemented method, data processing system, and computer program product for allowing limited access to a federation partner's audit logs in a secure, controlled manner, for the purposes of compliance demonstration. A request for audit data is received by a partner in the federated environment. The partner validates the request and requests a local report using local parameters against a local audit log store. The partner then builds a response based on the local report.Type: GrantFiled: January 4, 2007Date of Patent: March 13, 2012Assignee: International Business Machines CorporationInventors: Timothy James Hahn, Heather Maria Hinton, Patrick Ryan Wardrop
-
Publication number: 20110131643Abstract: A method and system for mediating security tokens to authorization data transactions in a data management system. The methods and systems intercept a data request between two applications or services, and validate and translate a security token sent with the data request from a format compatible with the first application or service to a format compatible with the second application or service.Type: ApplicationFiled: December 1, 2009Publication date: June 2, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Calvin D. Lawrence, Miguel A. Ortiz, Patrick Ryan Wardrop
-
Patent number: 7950064Abstract: A system, method, and program product is provided that operates when opening a word processing document that includes document content inserted at various insertion points within the document. The document is opened by a user that corresponds to a particular user identifier. The comments included in the document include recipient identifiers. A first set of comments are selected where the user's identifier is included in the recipient identifiers of the corresponding comments, and a second set of comments are selected where the user's identifier is not included in the recipient identifiers of the corresponding comments. The word processor displays the first set of comments at their respective insertion points within the document content and does not present the second set of comments.Type: GrantFiled: November 16, 2007Date of Patent: May 24, 2011Assignee: International Business Machines CorporationInventors: Timothy R. Chavez, Jacob Daniel Eisinger, Jennifer Elizabeth King, William Alexander Reichert, III, Patrick Ryan Wardrop
-
Patent number: 7877480Abstract: An authorization mechanism within a peer-to-peer network is presented. A central server that operates a centralized data repository search engine within a peer-to-peer network performs authentication and authorization operations with respect to users that access its services. A user at a peer node reviews peer-to-peer search results that have been gathered and returned by the centralized search engine. When the user desires to retrieve a file from another peer node, the user's peer node must obtain an authorization token from the central server, which authenticates the user or has previously authenticated the user. The user's peer node then presents the authorization token along with a request to retrieve the file from the other peer node. After verifying the authorization token, the other peer node responds with the requested file. If the other peer node cannot verify the authorization token, then the other peer node denies access to the file.Type: GrantFiled: July 31, 2008Date of Patent: January 25, 2011Assignee: International Business Machines CorporationInventor: Patrick Ryan Wardrop
-
Publication number: 20100185862Abstract: The confidentiality of JavaScript Object Notation (JSON) message data is secured using an encryption scheme. The encryption scheme implements a JSON encryption syntax, together with a set of processing rules for creating encrypting arbitrary data in JSON messages in a platform/language independent manner. A method for encrypting a data item in a JSON message begins by applying an encryption method and a key to the data item to generate a cipher value. A data object is then constructed that represents an encryption of the data item. The data item in the JSON message is then replaced with the data object, and the resulting modified JSON message is then output from a sending entity. At a receiving entity, information in the data object is used to re-generate the data item, which is then placed back in the original message.Type: ApplicationFiled: January 20, 2009Publication date: July 22, 2010Applicant: International Business Machines CorporationInventors: Timothy Walter Moore, Patrick Ryan Wardrop
-
Publication number: 20100185869Abstract: JSON (JavaScript Object Notation) message integrity is provided using a digital signature scheme. The digital signature scheme implements a set of processing rules for creating and representing digital signatures using a JSON signature syntax. The syntax preferably comprises a set of named elements, including a reference element, a signature information element, and a signature element. In one embodiment, a machine-implemented method for signing a JSON message begins by constructing a reference element for each data object in the JSON message to be signed. The data object is identified by a reference identifier. The reference element includes the reference identifier, a pointer (such as a URI) to a digest method, and a digest generated by applying the digest method to the data object or a given function of the data object. Then, a signature information element is constructed for one or more of the reference elements corresponding to the one or more data objects in the message that are being signed.Type: ApplicationFiled: January 20, 2009Publication date: July 22, 2010Applicant: International Business Machines CorporationInventors: Timothy Walter Moore, Patrick Ryan Wardrop, Michael McIntosh
-
Publication number: 20100146290Abstract: A method, system, and computer usable program product for token caching in a trust chain processing are provided in the illustrative embodiments. An information in a token associated with a first request is mapped. A determination is made whether a requester of the first request has provided a constraint in the first request, the constraint concerning the token, the constraint forming a client constraint. The client constraint is stored. The information and the mapped information is stored, forming stored information. The token is received in a second request. The stored information is reused if the client constraint allows reusing the stored information. A further determination may be made whether a target system receiving the mapped information has provided a server constraint, the second constraint concerning the mapped information, the second constraint forming a server constraint. The stored information may be reused if the server constraint allows reusing the stored information.Type: ApplicationFiled: December 4, 2008Publication date: June 10, 2010Applicant: International Business Machines CorporationInventors: David Werner Bachmann, Nicholas George Harlow, Heather Maria Hinton, Patrick Ryan Wardrop
-
Patent number: 7698375Abstract: A method and a system are presented in which federated domains interact within a federated environment. Domains within a federation can initiate federated operations for a user at other federated domains. A point-of-contact server within a domain relies upon a trust proxy within the domain to manage trust relationships between the domain and the federation. The point-of-contact server receives incoming requests directed to the domain and interfaces with a first application server and a second application server, wherein the first application server responds to requests for access to controlled resources and the second application server responds to requests for access to federated user lifecycle management functions, which are implemented using one or more pluggable modules that interface with the second application server.Type: GrantFiled: July 21, 2004Date of Patent: April 13, 2010Assignee: International Business Machines CorporationInventors: Heather Maria Hinton, Dolapo Martin Falola, Anthony Scott Moran, Patrick Ryan Wardrop
-
Publication number: 20090327397Abstract: A method of managing user personal information across a set of service provider sites is implemented, preferably as a web browser plug-in function. As a user navigates to a service provider web site and performs an interaction involving user identity attribute data, the interaction is recorded for later replay. Typically, the interaction is a graphical user interface (GUI) interaction. At a later time, previously-recorded interactions at service provider sites are replayed automatically, i.e., without requiring the user to navigate back to the individual sites and perform the interactions, and (during the replay operation) the user's previously-entered identity attribute data is located and retrieved. A display of the identity attribute data collected from the service provider sites then can be examined, e.g., for any inconsistency among the data.Type: ApplicationFiled: June 30, 2008Publication date: December 31, 2009Applicant: International Business Machines CorporationInventors: Jiayue Chen, Matthew Paul Duggan, Patrick Ryan Wardrop
-
Publication number: 20090259753Abstract: The invention provides federated functionality within a data processing system by means of a set of specialized runtimes, which are instances of an application for providing federation services to requesters. Each of the plurality of specialized runtimes provides requested federation services for selected ones of the requestors according to configuration data of respective federation relationships of the requestors with the identity provider. The configuration data is dynamically retrieved during initialization of the runtimes which allows the respective_runtime to be specialized for a given federation relationship. Requests are routed to the appropriate specialized runtime using the first requestor identity and the given federation relationship. The data, which describes each federation relationship between the identity provider and each of the plurality of requestors, is configured prior to initialization of the runtimes.Type: ApplicationFiled: June 9, 2009Publication date: October 15, 2009Applicant: International Business Machines CorporationInventors: Heather Maria Hinton, Anthony Scott Moran, Dolapo Martin Falola, Ivan Matthew Milman, Patrick Ryan Wardrop
-
Patent number: 7562382Abstract: The invention provides federated functionality within a data processing system by means of a set of specialized runtimes. Each of the plurality of specialized runtimes provides requested federation services for selected ones of the requestors according to configuration data of respective federation relationships of the requestors with the identity provider. The configuration data is dynamically retrieved during initialization of the runtimes which allows the respective runtime to be specialized for a given federation relationship. Requests are routed to the appropriate specialized runtime using the first requestor identity and the given federation relationship. The data which describes each federation relationship between the identity provider and each of the plurality of requesters is configured prior to initialization of the runtimes.Type: GrantFiled: December 16, 2004Date of Patent: July 14, 2009Assignee: International Business Machines CorporationInventors: Heather Maria Hinton, Anthony Scott Moran, Dolapo Martin Falola, Ivan Matthew Milman, Patrick Ryan Wardrop