Patents by Inventor Richard Guski

Richard Guski has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070250913
    Abstract: A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving function set (PSFS) comprising a list of application functions that read or write PII data objects. Each PII PSFS is also assigned a PII classification label. A PII data object is accessible via an application function of a PII PSFS having a PII classification label that is identical to or dominant of the PII classification label of the PII object. A user of the control facility is assigned a PII clearance set which contains a list of at least one PII classification label, which is employed in determining whether the user is entitled to access a particular function.
    Type: Application
    Filed: June 18, 2007
    Publication date: October 25, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Linda Betz, John Dayka, Walter Farrell, Richard Guski, Guenter Karjoth, Mark Nelson, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20060288228
    Abstract: An authenticated identity propagation and translation technique is provided based on a trust relationship between multiple user identification and authentication services resident on different computing components of a multi-component transaction processing computing environment including distributed and mainframe computing components. The technique includes, in one embodiment, forwarding, in association with transaction requests, identified and authenticated user identification and authentication information from a distributed component to a mainframe component, facilitating the selection of the appropriate mainframe user identity with which to execute the mainframe portion of the transaction, and creating the appropriate run-time security context.
    Type: Application
    Filed: August 29, 2006
    Publication date: December 21, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Patrick Botz, John Dayka, Donna Dillenberger, Richard Guski, Timothy Hahn, Margaret LaBelle, Mark Nelson
  • Publication number: 20060137021
    Abstract: A multi-identity security environment is created for use in controlling access to resources. The multi-identity security environment enables one process that is spawned by another process to access resources security accessible to the one process, as well as resources security accessible to the another process. The multi-identity security environment includes an identity of the one process and an identity of the another process.
    Type: Application
    Filed: December 21, 2004
    Publication date: June 22, 2006
    Applicant: International Business Machines Corporation
    Inventors: Ernest Bender, Richard Guski, Deborah Mapes, Bruce Wells
  • Publication number: 20050044409
    Abstract: A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving function set (PSFS) comprising a list of application functions that read or write PII data objects. Each PII PSFS is also assigned a PII classification label. A PII data object is accessible via an application function of a PII PSFS having a PII classification label that is identical to or dominant of the PII classification label of the PII object. A user of the control facility is assigned a PII clearance set which contains a list of at least one PII classification label, which is employed in determining whether the user is entitled to access a particular function.
    Type: Application
    Filed: August 19, 2003
    Publication date: February 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Linda Betz, John Dayka, Walter Farrell, Richard Guski, Guenter Karjoth, Mark Nelson, Birgit Pfitzmann, Matthias Schunter, Michael Waidner